Sciweavers

10435 search results - page 1913 / 2087
» Measuring system normality
Sort
View
145
Voted
CSREASAM
2003
15 years 5 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
156
Voted
JVM
2004
165views Education» more  JVM 2004»
15 years 5 months ago
Using Hardware Performance Monitors to Understand the Behavior of Java Applications
Modern Java programs, such as middleware and application servers, include many complex software components. Improving the performance of these Java applications requires a better ...
Peter F. Sweeney, Matthias Hauswirth, Brendon Caho...
WSC
2004
15 years 5 months ago
Building Credible Input Models
Most discrete-event simulation models have stochastic elements that mimic the probabilistic nature of the system under consideration. A close match between the input model and the...
Lawrence Leemis
WSCG
2004
143views more  WSCG 2004»
15 years 5 months ago
Palmprint Verification with Moments
Palmprint verification is an approach for verifying a palmprint input by matching the input to the claimed identity template stored in a database. If the dissimilarity measure bet...
Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Che...
186
Voted
MLMTA
2003
15 years 5 months ago
Using a Two-Layered Case-Based Reasoning for Prediction in Soccer Coach
Abstract— The prediction of the future states in MultiAgent Systems has been a challenging problem since the begining of MAS. Robotic soccer is a MAS environment in which the pre...
Mazda Ahmadi, Abolfazl Keighobadi Lamjiri, Mayssam...
« Prev « First page 1913 / 2087 Last » Next »