Sciweavers

2421 search results - page 264 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
CC
2005
Springer
153views System Software» more  CC 2005»
15 years 10 months ago
Completeness Analysis for Incomplete Object-Oriented Programs
We introduce a new approach, called completeness analysis, to computing points-to sets for incomplete Java programs such as library modules or applications in the presence of dynam...
Jingling Xue, Phung Hua Nguyen
DAS
2004
Springer
15 years 10 months ago
A Neural Network Classifier for Junk E-Mail
Abstract. Most e-mail readers spend a non-trivial amount of time regularly deleting junk e-mail (spam) messages, even as an expanding volume of such e-mail occupies server storage ...
Ian Stuart, Sung-Hyuk Cha, Charles C. Tappert
ICPP
1998
IEEE
15 years 9 months ago
Routing Algorithms for Anycast Messages
Use of anycast service can considerably simplify many communication applications. Two approaches can be used for routing anycast packets. Single-path routing always uses the same ...
Dong Xuan, Weijia Jia, Wei Zhao
ESWA
2010
109views more  ESWA 2010»
15 years 3 months ago
Visual and tangible interactions with physical and virtual objects using context-aware RFID
Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation and interface technology with physical and virtual objects in the ubiquitous comp...
Jae Yeol Lee, Dong Woo Seo, Byung Youn Song, Rajit...
ENGL
2006
170views more  ENGL 2006»
15 years 4 months ago
Hybrid Genetic Algorithms: A Review
Hybrid genetic algorithms have received significant interest in recent years and are being increasingly used to solve real-world problems. A genetic algorithm is able to incorporat...
Tarek A. El-Mihoub, Adrian A. Hopgood, Lars Nolle,...