Sciweavers

1746 search results - page 192 / 350
» A linear implementation of PACMAN
Sort
View
105
Voted
EUSFLAT
2007
140views Fuzzy Logic» more  EUSFLAT 2007»
15 years 5 months ago
Skew-Tree Based Multistage Fuzzy Controller for Nonlinear Systems
In this paper a multistage fuzzy controller is designed and implemented on the ball and beam system which is a well-known benchmark in the control area because of its nonlinear, u...
Abbas Khosravi, Jie Lu, Xianyi Zeng, R. Barzamini
147
Voted
ICISC
2007
117views Cryptology» more  ICISC 2007»
15 years 5 months ago
Side Channel Attacks on Irregularly Decimated Generators
Abstract. We investigate three side channel attacks on ABSG, a variant of irregularly decimated generators (IDG). The three attacks are timing analysis, phase-shift fault analysis ...
Chuan-Wen Loe, Khoongming Khoo
MASCOTS
2008
15 years 5 months ago
Taxis: Scalable Strong Anonymous Communication
Anonymity protocols are a privacy-enhancing technology for Internet-based communication. Two important characteristics of anonymity protocols are the strength of anonymity provide...
Andreas Hirt, Michael J. Jacobson Jr., Carey L. Wi...
131
Voted
FIMI
2004
239views Data Mining» more  FIMI 2004»
15 years 5 months ago
LCM ver. 2: Efficient Mining Algorithms for Frequent/Closed/Maximal Itemsets
: For a transaction database, a frequent itemset is an itemset included in at least a specified number of transactions. A frequent itemset P is maximal if P is included in no other...
Takeaki Uno, Masashi Kiyomi, Hiroki Arimura
IJCAI
2001
15 years 5 months ago
The Levelwise Version Space Algorithm and its Application to Molecular Fragment Finding
A tight integration of Mitchell's version space algorithm with Agrawal et al.'s Apriori algorithm is presented. The algorithm can be used to generate patterns that satis...
Luc De Raedt, Stefan Kramer