Sciweavers

17582 search results - page 3329 / 3517
» From Distributed Sequential Computing to Distributed Paralle...
Sort
View
106
Voted
EUROMICRO
2004
IEEE
15 years 7 months ago
Evaluation of Component Technologies with Respect to Industrial Requirements
We compare existing component technologies for embedded systems with respect to industrial requirements. The requirements are collected from the vehicular industry, but our findin...
Anders Möller, Mikael Åkerholm, Johan F...
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 7 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
GECCO
2006
Springer
167views Optimization» more  GECCO 2006»
15 years 7 months ago
Estimating the destructiveness of crossover on binary tree representations
In some cases, evolutionary algorithms represent individuals as typical binary trees with n leaves and n-1 internal nodes. When designing a crossover operator for a particular rep...
Luke Sheneman, James A. Foster
AFRIGRAPH
2001
ACM
15 years 7 months ago
Experiences in porting a virtual reality system to Java
Practical experience in porting a large virtual reality system from C/C++ to Java indicates that porting this type of real-time application is both feasible, and has several merit...
Shaun Bangay
CBMS
2001
IEEE
15 years 7 months ago
Abnormality Detection in Automated Mass Screening System of Diabetic Retinopathy
An approach of abnormality detection from color jiindirs images for automated mass screening system is proposed in this paper, which uses the object-based color difference image. ...
Gang Luo, Opas Chutatape, Huiqi Li, Shankar M. Kri...
« Prev « First page 3329 / 3517 Last » Next »