Sciweavers

722 search results - page 35 / 73
» Efficient Generation of Prime Numbers
Sort
View
89 views 138 votes 15 years 8 months ago  ACIIDS 2009»
Inter domain service routing is an element in the success of Next Generation Network. Service requests, such as the INVITE request in Session Initiation Protocol [21] may need to ...
108 views 139 votes 15 years 8 months ago  IWMM 2000»
The performance of automatic memory management may be improved if the policies used in allocating and collecting objects had knowledge of the lifetimes of objects. To date, approa...
141 views 147 votes 15 years 10 months ago  IPPS 2007»
Over the years reconfigurable computing devices such as FPGAs have evolved from gate-level glue logic to complex reprogrammable processing architectures. However, the tools used f...
143 views 134 votes 15 years 9 months ago  GECCO 2004»
Two efficient clustering-based genetic algorithms are developed for the optimisation of reaction rate parameters in chemical kinetic modelling. The genetic algorithms employed are ...
217 views 164 votes 15 years 8 months ago  HUMO 2007»
We propose a method to find candidate 2D articulated model configurations by searching for locally optimal configurations under a weak but computationally manageable fitness functi...
240 views 141 votes 15 years 6 months ago  ICPR 2010»
Canonical correlation analysis (CCA) is a powerful tool for analyzing multi-dimensional paired data. However, CCA tends to perform poorly when the number of paired samples is limit...
119 views 125 votes 15 years 5 months ago  IJCAI 2003»
Identifying and breaking the symmetries of CNF formulae has been shown to lead to significant reductions in search times. In this paper we describe a more systematic and efficient...
102 views 117 votes 15 years 4 months ago  JCP 2006»
The present paper proposes new approaches for recommendation tasks based on one-class support vector machines (1-SVMs) with graph kernels generated from a Laplacian matrix. We intr...
132 views 155 votes 15 years 1 months ago  INFORMATICALT 2010»
In this paper, we propose a mutual authentication scheme using nonce variable instead of Mac address and accompanying with token updates to improve the functionality. Lee et al. (2...
301 views 144 votes 15 years 5 months ago  SIMUTOOLS 2008»
Mobility and channel modeling is a very crucial task for the simulation of Vehicular Ad Hoc Network (VANET) scenarios. In this paper we present a new mobility modeling approach fo...