Sciweavers

670 search results - page 66 / 134
» An Immunological Approach to Change Detection: Theoretical R...
Sort
View
RECONFIG
2008
IEEE
122views VLSI» more  RECONFIG 2008»
14 years 2 months ago
Embedded Harmonic Control for Trajectory Planning in Large Environments
This paper presents an embedded FPGA–based architecture to compute navigation trajectories along a harmonic potential. The goals and obstacles may be changed during computation....
Cesar Torres-Huitzil, Bernard Girau, Amine M. Boum...
CANDC
2009
ACM
14 years 2 months ago
Growing and destroying the worth of ideas
This paper presents a novel computational approach to the study of creativity. In particular, it discusses a modeling framework that addresses the worth of ideas ascribed by agent...
Ricardo Sosa, John S. Gero, Kyle Jennings
NCA
2005
IEEE
14 years 1 months ago
A Wide Area Network Simulation of Single-Round Group Membership Algorithms
A recent theoretical result proposed Sigma, a novel GM protocol that forms views using a singleround of message exchange. Prior GM protocols have required more rounds in the worst...
Roger Khazan, Sophia Yuditskaya
SPIN
2005
Springer
14 years 1 months ago
An Incremental Heap Canonicalization Algorithm
Abstract. The most expensive operation in explicit state model checking is the hash computation required to store the explored states in a hash table. One way to reduce this comput...
Madanlal Musuvathi, David L. Dill
ESORICS
2004
Springer
14 years 1 months ago
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
Abstract. The recent approach of a model-based framework for steganography fruitfully contributes to the discussion on the security of steganography. In addition, the first propos...
Rainer Böhme, Andreas Westfeld