Sciweavers

2757 search results - page 456 / 552
» On separating systems
Sort
View
IJNSEC
2007
142views more  IJNSEC 2007»
15 years 4 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
ANOR
2005
93views more  ANOR 2005»
15 years 4 months ago
Looking Ahead with the Pilot Method
The pilot method as a meta-heuristic is a tempered greedy method aimed at obtaining better solutions while avoiding the greedy trap by looking ahead for each possible choice. Repea...
Stefan Voß, Andreas Fink, Cees Duin
APIN
2005
92views more  APIN 2005»
15 years 4 months ago
A Hybrid Neural-Genetic Algorithm for the Frequency Assignment Problem in Satellite Communications
A hybrid Neural-Genetic algorithm (NG) is presented for the frequency assignment problem in satellite communications (FAPSC). The goal of this problem is minimizing the cochannel i...
Sancho Salcedo-Sanz, Carlos Bousoño-Calz&oa...
145
Voted
TIP
2008
269views more  TIP 2008»
15 years 4 months ago
An Example-Based Face Hallucination Method for Single-Frame, Low-Resolution Facial Images
This paper proposes a face hallucination method for the reconstruction of high-resolution facial images from single-frame, low-resolution facial images. The proposed method has bee...
Jeong-Seon Park, Seong-Whan Lee
TIT
2008
68views more  TIT 2008»
15 years 4 months ago
Signaling Over Arbitrarily Permuted Parallel Channels
The problem of transmission of information over arbitrarily permuted parallel channels is studied here. The transmitter does not know over which channel a certain codesequence will...
Frans M. J. Willems, Alexei Gorokhov