Sciweavers

663 search results - page 80 / 133
» PKI design for the real world
Sort
View
IADIS
2008
15 years 1 months ago
e-Learning Courseware Effort Estimate Model
This paper presents an improved software estimation model, which uses to estimate developing effort of e-Learning's contents. This model is called the e-Learning courseware E...
Vajirasak Vanijja, Athitha Chokananratana
IWEC
2004
15 years 1 months ago
Commedia Virtuale: Theatre Inspiration for Expressive Avatars
We are investigating face, hand and body expressions to be applied to avatars of a virtual environment to improve their communication capabilities and enrich and facilitate their p...
Ben Salem
JMLR
2008
141views more  JMLR 2008»
14 years 11 months ago
Accelerated Neural Evolution through Cooperatively Coevolved Synapses
Many complex control problems require sophisticated solutions that are not amenable to traditional controller design. Not only is it difficult to model real world systems, but oft...
Faustino J. Gomez, Jürgen Schmidhuber, Risto ...
MP
2002
110views more  MP 2002»
14 years 11 months ago
Robust optimization - methodology and applications
Abstract. Robust Optimization (RO) is a modeling methodology, combined with computational tools, to process optimization problems in which the data are uncertain and is only known ...
Aharon Ben-Tal, Arkadi Nemirovski
ENTCS
2008
390views more  ENTCS 2008»
14 years 10 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel