Sciweavers

2801 search results - page 455 / 561
» On the Adequateness of the Connection Method
Sort
View
IV
1999
IEEE
91views Visualization» more  IV 1999»
15 years 2 months ago
Triangle Mesh Compression for Fast Rendering
Modern GIS(Geographic Information System) application programs and simulation systems have to handle large datasets for rendering. Currently three dimensional rendering hardware a...
Dong-Gyu Park, Yang-Soo Kim, Hwan-Gue Cho
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 2 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
GECCO
1999
Springer
133views Optimization» more  GECCO 1999»
15 years 2 months ago
Evolution of Goal-Directed Behavior from Limited Information in a Complex Environment
In this paper, we apply an evolutionary algorithm to learning behavior on a novel, interesting task to explore the general issue of learning e ective behaviors in a complex enviro...
Matthew R. Glickman, Katia P. Sycara
WCRE
1999
IEEE
15 years 2 months ago
Type-Check Elimination: Two Object-Oriented Reengineering Patterns
In reengineering an object-oriented system we want to benefit from the expertise developed in earlier efforts. It is therefore essential to have a way to communicate expertise at ...
Stéphane Ducasse, Tamar Richner, Robb Nebbe
DATE
1998
IEEE
108views Hardware» more  DATE 1998»
15 years 2 months ago
Stream Communication between Real-Time Tasks in a High-Performance Multiprocessor
The demands in terms of processing performance, communication bandwidth and real-time throughput of many multimedia applications are much higher than today's processing archi...
Jeroen A. J. Leijten, Jef L. van Meerbergen, Adwin...