Sciweavers

957 search results - page 85 / 192
» Addition Chain Heuristics
Sort
View
IH
2007
Springer
14 years 4 months ago
A Graph Game Model for Software Tamper Protection
We present a probabilistic program-transformation algorithm to render a given program tamper-resistant. In addition, we suggest a model to estimate the required effort for an atta...
Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Ve...
AICCSA
2006
IEEE
86views Hardware» more  AICCSA 2006»
14 years 4 months ago
On the Optimal Deployment of Heterogeneous Sensing Devices
The problem of optimally deploying a heterogeneous set of sensing devices in environments with differential surveillance requirements is presented. The problem is formulated in th...
Rabie Ramadan, Khaled Abdelghany, Hesham El-Rewini
CAIP
2005
Springer
102views Image Analysis» more  CAIP 2005»
14 years 3 months ago
Improvement of a Person Labelling Method Using Extracted Knowledge on Costume
This paper presents a novel approach for automatic person labelling in video sequences using costumes. The person recognition is carried out by extracting the costumes of all the p...
Gaël Jaffré, Philippe Joly
GECCO
2005
Springer
128views Optimization» more  GECCO 2005»
14 years 3 months ago
Fitness-based neighbor selection for multimodal function optimization
We propose a selection scheme called Fitness-based Neighbor Selection (FNS) for multimodal optimization. The FNS is aimed for ill-scaled and locally multimodal domain, both found ...
Shin Ando, Shigenobu Kobayashi
GECCO
2005
Springer
14 years 3 months ago
Towards an analysis of dynamic environments
Although the interest in nature-inspired optimization of dynamic problems has been growing constantly over the past decade, very little has been done to analyze and characterize a...
Jürgen Branke, Erdem Salihoglu, Sima Uyar