Sciweavers

17298 search results - page 3441 / 3460
» Abstract computing machines
Sort
View
ASIACRYPT
2010
Springer
13 years 6 months ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel
CEC
2010
IEEE
13 years 6 months ago
Beating the 'world champion' evolutionary algorithm via REVAC tuning
Abstract-- We present a case study demonstrating that using the REVAC parameter tuning method we can greatly improve the `world champion' EA (the winner of the CEC2005 competi...
Selmar K. Smit, A. E. Eiben
ICTAI
2010
IEEE
13 years 6 months ago
The BioASP Library: ASP Solutions for Systems Biology
Abstract--Today's molecular biology is confronted with enormous amounts of data, generated by new high-throughput technologies, along with an increasing number of biological m...
Martin Gebser, Arne König, Torsten Schaub, Sv...
KI
2010
Springer
13 years 6 months ago
A Testbed for Adaptive Human-Robot Collaboration
Abstract. This paper presents a novel method for developing and evaluating intelligent robot behavior for joint human-robot activities. We extended a physical simulation of an auto...
Alexandra Kirsch, Yuxiang Chen
LCTRTS
2010
Springer
13 years 6 months ago
Translating concurrent action oriented specifications to synchronous guarded actions
Concurrent Action-Oriented Specifications (CAOS) model the behavior of a synchronous hardware circuit as asynchronous guarded at an abstraction level higher than the Register Tran...
Jens Brandt, Klaus Schneider, Sandeep K. Shukla
« Prev « First page 3441 / 3460 Last » Next »