Sciweavers

7526 search results - page 1233 / 1506
» The Design and Implementation of the A2QM3 System
Sort
View
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
15 years 8 months ago
Fine-Grained and Scalable Approaches for Message Integrity
When we have multiple users compiling a single message, including shared contents, metadata, policy, and so on, the integrity of the contents created by individual users needs to ...
Joon S. Park, Ganesh Devarajan
IPPS
2007
IEEE
15 years 8 months ago
Reifying Control of Multi-Owned Network Resources
Communication delay is a key source of uncertainty in distributed systems. Existing approaches to reduce this uncertainty focus on maintaining sufficient surplus bandwidth; appli...
Nadeem Jamali, Chen Liu
RTCSA
2007
IEEE
15 years 8 months ago
A NOR Emulation Strategy over NAND Flash Memory
This work is motivated by a strong market demand in the replacement of NOR flash memory with NAND flash memory to cut down the cost in many embedded-system designs, such as mobi...
Jian-Hong Lin, Yuan-Hao Chang, Jen-Wei Hsieh, Tei-...
CCS
2007
ACM
15 years 8 months ago
Trust management services in relational databases
Trust management represents today a promising approach for supporting access control in open environments. While several approaches have been proposed for trust management and sig...
Sabrina De Capitani di Vimercati, Sushil Jajodia, ...
GECCO
2007
Springer
177views Optimization» more  GECCO 2007»
15 years 8 months ago
Evolving virtual creatures revisited
Thirteen years have passed since Karl Sims published his work on evolving virtual creatures. Since then, several novel approaches to neural network evolution and genetic algorithm...
Peter Krcah
« Prev « First page 1233 / 1506 Last » Next »