Sciweavers

2015 search results - page 347 / 403
» Hidden Software Capabilities
Sort
View
80
Voted
AES
2005
Springer
81views Cryptology» more  AES 2005»
15 years 14 days ago
Optimum design of an interbody implant for lumbar spine fixation
A new minimally invasive surgical technique for lumbar spine fixation is currently in development. The procedure makes use of an interbody implant that is inserted between two ver...
Andrés Tovar, Shawn E. Gano, James J. Mason...
INFSOF
2007
104views more  INFSOF 2007»
15 years 14 days ago
A state-based approach to integration testing based on UML models
: Correct functioning of object-oriented software depends upon the successful integration of classes. While individual classes may function correctly, several new faults can arise ...
Shaukat Ali, Lionel C. Briand, Muhammad Jaffar-Ur ...
86
Voted
JCM
2007
76views more  JCM 2007»
15 years 13 days ago
Scheduling Small Packets in IPSec Multi-accelerator Based Systems
—IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these ...
Antonio Vincenzo Taddeo, Alberto Ferrante, Vincenz...
100
Voted
ECRA
2002
129views more  ECRA 2002»
15 years 10 days ago
A formal approach to negotiating agents development
This paper presents a formal and executable approach to capture the behaviour of parties involved in a negotiation. A party is modeled as a negotiating agent composed of a communi...
Marlon Dumas, Guido Governatori, Arthur H. M. ter ...
ML
2000
ACM
244views Machine Learning» more  ML 2000»
15 years 10 days ago
Learnable Evolution Model: Evolutionary Processes Guided by Machine Learning
A new class of evolutionary computation processes is presented, called Learnable Evolution Model or LEM. In contrast to Darwinian-type evolution that relies on mutation, recombinat...
Ryszard S. Michalski