Sciweavers

12993 search results - page 2536 / 2599
» Artificial Intelligence in China
Sort
View
CP
2007
Springer
14 years 3 months ago
Tradeoffs in the Complexity of Backdoor Detection
Abstract There has been considerable interest in the identification of structural properties of combinatorial problems that lead to efficient algorithms for solving them. Some of...
Bistra N. Dilkina, Carla P. Gomes, Ashish Sabharwa...
CP
2007
Springer
14 years 3 months ago
MiniZinc: Towards a Standard CP Modelling Language
Abstract. There is no standard modelling language for constraint programming (CP) problems. Most solvers have their own modelling language. This makes it difficult for modellers to...
Nicholas Nethercote, Peter J. Stuckey, Ralph Becke...
DRM
2007
Springer
14 years 3 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
DRM
2007
Springer
14 years 3 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
EPIA
2007
Springer
14 years 3 months ago
An Omnidirectional Vision System for Soccer Robots
This paper describes a complete and efficient vision system developed for the robotic soccer team of the University of Aveiro, CAMBADA (Cooperative Autonomous Mobile roBots with A...
António J. R. Neves, Gustavo A. Corrente, A...
« Prev « First page 2536 / 2599 Last » Next »