Sciweavers

14078 search results - page 2417 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
ATAL
2005
Springer
15 years 10 months ago
An agent-based approach for managing symbiotic simulation of semiconductor assembly and test operation
The rapid changing business environment of high-tech asset intensive enterprises such as semiconductor manufacturing constantly drives production managers to look for better solut...
Malcolm Yoke-Hean Low, Kong Wei Lye, Peter Lenderm...
ITC
2003
IEEE
151views Hardware» more  ITC 2003»
15 years 10 months ago
Fault Collapsing via Functional Dominance
A fault fj is said to dominate another fault fi if all tests for fi detect fj . When two faults dominate each other, they are called equivalent. Dominance and equivalence relation...
Vishwani D. Agrawal, A. V. S. S. Prasad, Madhusuda...
ICAIL
2003
ACM
15 years 10 months ago
Specifying and Reasoning with Institutional Agents
This paper proposes a logic-oriented framework for institutional agents specification and analysis. Within this framework institutional agents are seen as artificial agents that a...
Filipe Santos, Olga Pacheco
CCS
2003
ACM
15 years 10 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
CHI
2009
ACM
15 years 9 months ago
Adaptive information search: age-dependent interactions between cognitive profiles and strategies
Previous research has shown that older adults performed worse in web search tasks, and attributed poorer performance to a decline in their cognitive abilities. We conducted a stud...
Jessie Chin, Wai-Tat Fu, Thomas George Kannampalli...
« Prev « First page 2417 / 2816 Last » Next »