Sciweavers

5722 search results - page 545 / 1145
» Security Function Interactions
Sort
View
ICALT
2005
IEEE
15 years 10 months ago
Visualizing Topic Maps for e-Learning
TM4L is an e-learning environment providing editing and browsing support for developing and using Topic Maps-based digital course libraries. The TM4L functionality is enhanced by ...
Darina Dicheva, Christo Dichev, Dandan Wang
BVAI
2005
Springer
15 years 10 months ago
A Neural Model of Human Object Recognition Development
The human capability of recognizing objects visually is here held to be a function emerging as result of interactions between epigenetic influences and basic neural plasticity mec...
Rosaria Grazia Domenella, Alessio Plebe
CEC
2008
IEEE
15 years 7 months ago
Evosphere: Evolutionary dynamics in a population of fighting virtual creatures
It is often suggested that traditional models of artificial evolution, based on explicit, human-defined fitness functions, are fundamentally more restricted and less creative than ...
Thomas Miconi
WOA
2001
15 years 6 months ago
A Contract Decommitment Protocol for Automated Negotiation in Time Variant Environments
Negotiation is a fundamental mechanism in distributed multi-agent systems. Since negotiation is a time-spending process, in many scenarios agents have to take into account the pas...
Federico Bergenti, Agostino Poggi, Matteo Somacher
BIRTHDAY
2012
Springer
14 years 25 days ago
The Logical Execution Time Paradigm
Embedded systems must interact with their real-time environment in a timely and dependable fashion. Most embeddedsystems architectures and design processes consider “nonfunction...
Christoph M. Kirsch, Ana Sokolova