Sciweavers

13004 search results - page 2484 / 2601
» Mining Software Data
Sort
View
JFR
2006
109views more  JFR 2006»
15 years 3 months ago
Alice: An information-rich autonomous vehicle for high-speed desert navigation
This paper describes the implementation and testing of Alice, the California Institute of Technology's entry in the 2005 DARPA Grand Challenge. Alice utilizes a highly networ...
Lars B. Cremean, Tully B. Foote, Jeremy H. Gillula...
KAIS
2008
109views more  KAIS 2008»
15 years 3 months ago
Knowledge-empowered automated negotiation system for e-Commerce
This paper focuses on knowledge empowered automated negotiation systems for buyer-centric multi-bilateral multi-attribute e-Procurement. We propose two knowledge empowered models,...
Zhuang Yan, Simon Fong, Meilin Shi
JSS
2006
80views more  JSS 2006»
15 years 3 months ago
Polyhedral space generation and memory estimation from interface and memory models of real-time video systems
We present a tool and a methodology for estimating the memory storage requirement for synchronous real-time video processing systems. Typically, a designer will use the feedback i...
Benny Thörnberg, Qubo Hu, Martin Palkovic, Ma...
FIRSTMONDAY
2007
61views more  FIRSTMONDAY 2007»
15 years 3 months ago
Implementing openness: An international institutional perspective
The debate on “openness” has tended to focus on standard setting, software copyrights, patent policy and collaborative innovation models – large issues that evoke heated deb...
Sacha Wunsch-Vincent, Taylor Reynolds, Andrew Wyck...
IJNSEC
2007
194views more  IJNSEC 2007»
15 years 3 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
« Prev « First page 2484 / 2601 Last » Next »