Sciweavers

526 search results - page 68 / 106
» Towards the Verifying Compiler
Sort
View
CONCUR
2010
Springer
14 years 10 months ago
Trust in Anonymity Networks
Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusi...
Vladimiro Sassone, Sardaouna Hamadou, Mu Yang
IJBRA
2007
84views more  IJBRA 2007»
14 years 9 months ago
Is the protein folding an aim-oriented process? Human haemoglobin as example
: The model for protein folding (in silico) simulation is presented. Three steps have been implemented: • early stage folding based on the backbone conformation • hydrophobic c...
Michal Brylinski, Leszek Konieczny, Irena Roterman
SUTC
2010
IEEE
14 years 8 months ago
User-Based Attestation for Trustworthy Visual Sensor Networks
Abstract—Camera networks are used for a variety of applications including surveillance, traffic monitoring or elderly care. The shift from analog towards fully digitized systems...
Thomas Winkler, Bernhard Rinner
ICARCV
2008
IEEE
154views Robotics» more  ICARCV 2008»
15 years 4 months ago
Teaching a robot to operate a lift
—This paper discusses a vision problem for the detection of lift operation panel which is a plane subject to deformation due to viewing angle change. The key problem in this proj...
Han Wang, Y. Ying, V. P. Dinh, B. Y. Xie, Danwei W...
GECCO
2005
Springer
136views Optimization» more  GECCO 2005»
15 years 3 months ago
Exploring extended particle swarms: a genetic programming approach
Particle Swarm Optimisation (PSO) uses a population of particles that fly over the fitness landscape in search of an optimal solution. The particles are controlled by forces tha...
Riccardo Poli, Cecilia Di Chio, William B. Langdon