Sciweavers

4650 search results - page 836 / 930
» Generating and evaluating evaluative arguments
Sort
View
EMSOFT
2009
Springer
15 years 8 months ago
Cache-aware scheduling and analysis for multicores
The major obstacle to use multicores for real-time applications is that we may not predict and provide any guarantee on real-time properties of embedded software on such platforms...
Nan Guan, Martin Stigge, Wang Yi, Ge Yu
ERCIMDL
2009
Springer
139views Education» more  ERCIMDL 2009»
15 years 8 months ago
Geographic Information Retrieval and Digital Libraries
In this demonstration we will examine the effectiveness of Geographic Information Retrieval (GIR) methods in digital library interfaces. We will show how various types of informat...
Ray R. Larson
GECCO
2009
Springer
254views Optimization» more  GECCO 2009»
15 years 8 months ago
Agglomerative genetic algorithm for clustering in social networks
Size and complexity of data repositories collaboratively created by Web users generate a need for new processing approaches. In this paper, we study the problem of detection of ļ¬...
Marek Lipczak, Evangelos E. Milios
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
15 years 8 months ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for user’s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq
ICB
2009
Springer
194views Biometrics» more  ICB 2009»
15 years 8 months ago
FM Model Based Fingerprint Reconstruction from Minutiae Template
Minutiae-based representation is the most widely adopted fingerprint representation scheme. The compactness of minutiae template has created an impression that the minutiae templa...
Jianjiang Feng, Anil K. Jain