Sciweavers

1646 search results - page 247 / 330
» Automatic generation of two-party computations
Sort
View
ICDCS
2007
IEEE
14 years 4 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
IPPS
2007
IEEE
14 years 4 months ago
Integrated Environment for Embedded Control Systems Design
The motivation of our work is to make a design tool for distributed embedded systems compliant with HIS and AUTOSAR. The tool is based on Processor Expert, a component oriented de...
Roman Bartosinski, Zdenek Hanzálek, Petr St...
IV
2007
IEEE
149views Visualization» more  IV 2007»
14 years 4 months ago
Information Visualization of Multi-dimensional Cellular Automata using GPU Programming
We propose a method for generating all possible rules of multidimension Boolean cellular automata (CA). Based on an original encoding method and the programming of graphical proce...
Stéphane Gobron, Daniel Mestre
GECCO
2007
Springer
163views Optimization» more  GECCO 2007»
14 years 4 months ago
Action-selection and crossover strategies for self-modeling machines
In previous work [7] a computational framework was demonstrated that employs evolutionary algorithms to automatically model a given system. This is accomplished by alternating the...
Josh C. Bongard
ICCSA
2007
Springer
14 years 4 months ago
Crawling the Content Hidden Behind Web Forms
The crawler engines of today cannot reach most of the information contained in the Web. A great amount of valuable information is “hidden” behind the query forms of online data...
Manuel Álvarez, Juan Raposo, Alberto Pan, F...