Sciweavers

5754 search results - page 989 / 1151
» Multi-class Model M
Sort
View
DSS
2006
74views more  DSS 2006»
15 years 4 months ago
Second opinions and online consultations
Consumers increasingly obtain direct consultations from experts, thanks to the prevalent use of Information Technology and the Internet. Motivated by the online consultation pract...
Zafer D. Ozdemir, M. Tolga Akçura, Kemal Al...
144
Voted
IJAIT
2008
99views more  IJAIT 2008»
15 years 4 months ago
Optimal Basic Block Instruction Scheduling for Multiple-Issue Processors Using Constraint Programming
Instruction scheduling is one of the most important steps for improving the performance of object code produced by a compiler. A fundamental problem that arises in instruction sch...
Abid M. Malik, Jim McInnes, Peter van Beek
ENTCS
2006
145views more  ENTCS 2006»
15 years 4 months ago
A Calculus for Data Mapping
Technologies for overcoming heterogeneities between autonomous data sources are key in the emerging networked world. In this paper we discuss the initial results of a formal inves...
George H. L. Fletcher, Catharine M. Wyss, Edward L...
IJHR
2008
82views more  IJHR 2008»
15 years 4 months ago
A Team of Humanoid Game commentators
We present our work on creating a team of two humanoid robot commentators for soccer games of teams of four AIBO robots. The two humanoids stand on the side lines of the field, aut...
Manuela M. Veloso, Nicholas Armstrong-Crews, Sonia...
IJNSEC
2008
69views more  IJNSEC 2008»
15 years 4 months ago
Proof of Forward Security for Password-based Authenticated Key Exchange
Recently, M. Abdalla et al. proposed a slightly different variant of AuthA, based on the scheme proposed by E. Bresson et al., and provided the first complete proof of forward-sec...
Shuhua Wu, Yuefei Zhu