Sciweavers

3954 search results - page 447 / 791
» Image-based Model Completion
Sort
View
ACSAC
1999
IEEE
15 years 9 months ago
Using Checkable Types in Automatic Protocol Analysis
The Automatic Authentication Protocol Analyzer, 2nd Version AAPA2 is a fast, completely automatic tool for formally analyzing cryptographic protocols. It correctly identi es vulne...
Stephen H. Brackin
ISWC
1999
IEEE
15 years 9 months ago
Non-Ideal Battery Properties and Low Power Operation in Wearable Computing
This paper describes non-ideal properties of batteries and how these properties may impact power-performance trade-offs in wearable computing. The first part of the paper details ...
Thomas L. Martin, Daniel P. Siewiorek
GECCO
1999
Springer
15 years 9 months ago
Infrastructure Work Order Planning Using Genetic Algorithms
Infrastructure management offices plan and complete several thousand small construction projects annually. Effective planning is vital if the public and private sectors are to mai...
E. William East
APCHI
1998
IEEE
15 years 9 months ago
Knowledge Required for Understanding Task-Oriented Instructions
When they encounter problems with a novel or infrequently performed task, experienced users often complete their work by referring to manuals and trying task-oriented exploration....
Muneo Kitajima, Peter G. Polson
ICNP
1998
IEEE
15 years 9 months ago
Congestion Control Performance of a Reliable Multicast Protocol
This paper evaluates the congestion control performance of Pseudofed, a congestion-controlled, reliable multicast transport protocol for bulk data transfer. Pseudofed's conge...
Dante DeLucia, Katia Obraczka