Sciweavers

2290 search results - page 383 / 458
» Extensible Protected Types
Sort
View
TMC
2010
134views more  TMC 2010»
15 years 28 days ago
Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh Networks
—Wireless mesh networks are a promising area for the deployment of new wireless communication and networking technologies. In this paper, we address the problem of enabling effec...
Claudia Canali, Maria Elena Renda, Paolo Santi, Si...
192
Voted
WRLA
2010
15 years 27 days ago
The Linear Temporal Logic of Rewriting Maude Model Checker
Abstract. This paper presents the foundation, design, and implementation of the Linear Temporal Logic of Rewriting model checker as an extension of the Maude system. The Linear Tem...
Kyungmin Bae, José Meseguer
229
Voted
CORR
2010
Springer
427views Education» more  CORR 2010»
15 years 26 days ago
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algori
Genetic algorithms are a population-based Meta heuristics. They have been successfully applied to many optimization problems. However, premature convergence is an inherent charact...
Poonam Garg
173
Voted
CVPR
2010
IEEE
15 years 17 days ago
Common visual pattern discovery via spatially coherent correspondences
We investigate how to discover all common visual patterns within two sets of feature points. Common visual patterns generally share similar local features as well as similar spati...
Hairong Liu, Shuicheng Yan
127
Voted
GI
2010
Springer
15 years 16 days ago
Semantics and Execution of Domain Specific Models
: paper we present a two-level approach to extend the abstract syntax of models with concrete semantics in order to execute such models. First, a light-weight execution infrastruct...
Christian Motika, Hauke Fuhrmann, Reinhard von Han...