Sciweavers

1154 search results - page 181 / 231
» Mathematizing C concurrency
Sort
View
87
Voted
FS
2006
84views more  FS 2006»
15 years 17 days ago
Iterative construction of the optimal Bermudan stopping time
Abstract. We present an iterative procedure for computing the optimal Bermudan stopping time, hence the Bermudan Snell envelope. The method produces an increasing sequence of appro...
Anastasia Kolodko, John Schoenmakers
IJSN
2008
80views more  IJSN 2008»
15 years 17 days ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah
COGSCI
2007
139views more  COGSCI 2007»
15 years 17 days ago
Mapping the Color Space of Saccadic Selectivity in Visual Search
Color coding is used to guide attention in computer displays for such critical tasks as baggage screening or air traffic control. It has been shown that a display object attracts...
Yun Xu, Emily C. Higgins, Mei Xiao, Marc Pomplun
103
Voted
ISI
2008
Springer
15 years 17 days ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
RAS
2006
86views more  RAS 2006»
15 years 15 days ago
Using cellular automata and gradients to control self-reconfiguration
Self-reconfigurable robots are built from modules, which are autonomously able to change the way they are connected. Such a robot can, through this self-reconfiguration process, c...
Kasper Støy