Sciweavers

2109 search results - page 286 / 422
» Solving Necklace Constraint Problems
Sort
View
RTCSA
2006
IEEE
15 years 11 months ago
Hardware-Software Codesign of Multimedia Embedded Systems: the PeaCE
Hardware/software codesign involves various design problems including system specification, design space exploration, hardware/software co-verification, and system synthesis. A co...
Soonhoi Ha, Choonseung Lee, Youngmin Yi, Seongnam ...
IWCMC
2006
ACM
15 years 11 months ago
Security aspects of inter-satellite links using neural networks
This paper presents a neural network model for routing in the space segment of a Satellite Personal Communication System. At first, a proper energy function is constructed from th...
Peter P. Stavroulakis, Ioannis Dimou, Harilaos G. ...
HICSS
2005
IEEE
131views Biometrics» more  HICSS 2005»
15 years 10 months ago
Train Traffic Deviation Handling Using Tabu Search and Simulated Annealing
This paper addresses the problem of solving conflicts in railway traffic that arise due to disturbances. It is formulated as a problem of re-scheduling meets and overtakes of trai...
Johanna Törnquist, Jan A. Persson
IPPS
2005
IEEE
15 years 10 months ago
Job Allocation Schemes in Computational Grids Based on Cost Optimization
In this paper we propose two price-based job allocation schemes for computational grids. A grid system tries to solve problems submitted by various grid users by allocating the jo...
Satish Penmatsa, Anthony T. Chronopoulos
150
Voted
CCS
2005
ACM
15 years 10 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet