Search

Showing total 4,300 results
4,300 results

Search Results

151. Consolidated Trees: An Analysis of Structural Convergence.

152. Energy-Efficient Algorithms for Flow Time Minimization.

153. Optimal Node Routing.

154. Convergence of Autonomous Mobile Robots with Inaccurate Sensors and Movements.

155. Evolvable Hardware System at Extreme Low Temperatures.

156. Hardware Fault-Tolerance Within the POEtic System.

157. An Adaptive Self-tolerant Algorithm for Hardware Immune System.

158. Compact Error-Resilient Computational DNA Tiling Assemblies.

159. Testing Structure Freeness of Regular Sets of Biomolecular Sequences.

160. Concise Version Vectors in WinFS.

161. Computing with Reads and Writes in the Absence of Step Contention.

162. Communication Data Multiplexing in Distributed Simulation.

163. Performance Monitoring for Distributed Service Oriented Grid Architecture.

164. High Performance Task Scheduling Algorithm for Heterogeneous Computing System.

165. A Practical Comparison of Cluster Operating Systems Implementing Sequential and Transactional Consistency.

166. A Kleene Theorem for Languages of Words Indexed by Linear Orderings.

167. Tagged Sets: A Secure and Transparent Coordination Medium.

168. Synthesis of Reo Circuits for Implementation of Component-Connector Automata Specifications.

169. Uniform Satisfiability Problem for Local Temporal Logics over Mazurkiewicz Traces.

170. A Game Semantics of the Asynchronous π-Calculus.

171. A New Watermarking Method Based on DWT.

172. Channel Equalization Based on Two Weights Neural Network.

173. Universal Designated-Verifier Proxy Blind Signatures for E-Commerce.

174. Incremental Fuzzy Decision Tree-Based Network Forensic System.

175. The Study of the Auto Color Image Segmentation.

176. The Next Generation PARLAY X with QoS/QoE.

177. Genetic Algorithm Utilized in Cost-Reduction Driven Web Service Selection.

178. Application of Fuzzy Logic for Distributed Intrusion Detection.

179. A CBR Engine Adapting to IDS.

180. Attack Scenario Construction Based on Rule and Fuzzy Clustering.

181. Tamper Detection for Ubiquitous RFID-Enabled Supply Chain.

182. A New User-Habit Based Approach for Early Warning of Worms.

183. A New Conceptual Framework Within Information Privacy: Meta Privacy.

184. HMM Parameter Adaptation Using the Truncated First-Order VTS and EM Algorithm for Robust Speech Recognition.

185. Clustering XML Documents by Structure Based on Common Neighbor.

186. Interest Region-Based Image Retrieval System Based on Graph-Cut Segmentation and Feature Vectors.

187. Design of a Switching PID Controller Using Advanced Genetic Algorithm for a Nonlinear System.

188. Neural Network Based Algorithms for Diagnosis and Classification of Breast Cancer Tumor.

189. Empirical Analysis of Database Privacy Using Twofold Integrals.

190. Heuristic Algorithms for Fast and Accurate Tracking of Moving Objects in Unrestricted Environments.

191. Real Time Virtualized Real Object Manipulation in an Augmented Reality Environment.

192. Smooth Bayesian Kernel Machines.

193. Knowledge Extraction from Unsupervised Multi-topographic Neural Network Models.

194. An Agent-Based PLA for the Cascade Correlation Learning Architecture.

195. Global Stability Conditions of Locally Recurrent Neural Networks.

196. Combination Methods for Ensembles of RBFs.

197. Lagrange Neural Network for Solving CSP Which Includes Linear Inequality Constraints.

198. New Neural Network Based Mobile Location Estimation in a Metropolitan Area.

199. Nonlinear Regression with Piecewise Affine Models Based on RBFN.

200. Predictive Speech Coding Improvements Based on Speaker Recognition Strategies.