Sciweavers

12562 search results - page 2262 / 2513
» Distributed Xbean Applications
Sort
View
TASLP
2008
149views more  TASLP 2008»
15 years 3 months ago
Music Retrieval Over Wireless Ad-Hoc Networks
Wireless networks introduce brand new opportunities for music delivery. The trend of using mobile devices in wireless networks, can significantly extent the recent change of paradi...
Ioannis Karydis, Alexandros Nanopoulos, Apostolos ...
134
Voted
TCS
2008
15 years 3 months ago
Comparing evolutionary algorithms to the (1+1)-EA
In this paper, we study the conditions in which the (1+1)-EA compares favorably to other evolutionary algorithms (EAs) in terms of fitness function distribution at given iteration...
Pavel A. Borisovsky, Anton V. Eremeev
TOG
2008
149views more  TOG 2008»
15 years 3 months ago
Randomized cuts for 3D mesh analysis
The goal of this paper is to investigate a new shape analysis method based on randomized cuts of 3D surface meshes. The general strategy is to generate a random set of mesh segmen...
Aleksey Golovinskiy, Thomas A. Funkhouser
AAI
2004
136views more  AAI 2004»
15 years 3 months ago
Between Location Awareness and Aware Locations: Where to Put The Intelligence
Location awareness is a key ingredient to many applications of mobile devices. Devices with the ability to determine their own position in space can retrieve, filter or present in...
Andreas Butz
JSA
2007
89views more  JSA 2007»
15 years 3 months ago
Robust codes and robust, fault-tolerant architectures of the Advanced Encryption Standard
— Hardware implementations of cryptographic algorithms are vulnerable to fault analysis attacks. Methods based on traditional fault-tolerant architectures are not suited for prot...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
« Prev « First page 2262 / 2513 Last » Next »