Sciweavers

443 search results - page 38 / 89
» A Simple Solution to Type Specialization
Sort
View
CODES
2007
IEEE
14 years 2 months ago
A smart random code injection to mask power analysis based side channel attacks
One of the security issues in embedded system is the ability of an adversary to perform side channel attacks. Power analysis attacks are often very successful, where the power seq...
Jude Angelo Ambrose, Roshan G. Ragel, Sri Paramesw...
ICONIP
1998
13 years 9 months ago
Computing Iterative Roots with Neural Networks
Many real processes are composed of a n-fold repetition of some simpler process. If the whole process can be modelled with a neural network, we present a method to derive a model ...
Lars Kindermann
PE
2002
Springer
109views Optimization» more  PE 2002»
13 years 8 months ago
Non-cooperative routing in loss networks
The paper studies routing in loss networks in the framework of a non-cooperative game with selfish users. Two solution concepts are considered: the Nash equilibrium, corresponding...
Eitan Altman, Rachid El Azouzi, Vyacheslav M. Abra...
IKE
2007
13 years 10 months ago
A Set-Theoretic Data Model For Evolving Database Environments
The paper presents an integrated set-theoretic data model that offers a framework for defining a unified schema for any database environment. We utilise the concepts ”entity...
Emmanuel J. Yannakoudakis, Panagiotis Andrikopoulo...
GECCO
2009
Springer
167views Optimization» more  GECCO 2009»
14 years 3 months ago
Fixed-parameter evolutionary algorithms and the vertex cover problem
In this paper, we consider multi-objective evolutionary algorithms for the Vertex Cover problem in the context of parameterized complexity. We relate the runtime of our algorithms...
Stefan Kratsch, Frank Neumann