Sciweavers

1585 search results - page 160 / 317
» Automatically optimizing secure computation
Sort
View
ICRA
2002
IEEE
105views Robotics» more  ICRA 2002»
14 years 1 months ago
Learning Behavioral Parameterization using Spatio-Temporal Case-Based Reasoning
This paper presents an approach to learning an optimal behavioral parameterization in the framework of a Case-Based Reasoning methodology for autonomous navigation tasks. It is ba...
Maxim Likhachev, Michael Kaess, Ronald C. Arkin
GECCO
2007
Springer
215views Optimization» more  GECCO 2007»
14 years 1 days ago
Finding safety errors with ACO
Model Checking is a well-known and fully automatic technique for checking software properties, usually given as temporal logic formulae on the program variables. Most model checke...
Enrique Alba, J. Francisco Chicano
GECCO
2009
Springer
191views Optimization» more  GECCO 2009»
14 years 2 months ago
Evolvable malware
The concept of artificial evolution has been applied to numerous real world applications in different domains. In this paper, we use this concept in the domain of virology to ev...
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Mu...
MMSEC
2006
ACM
148views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Minimizing the embedding impact in steganography
In this paper, we study the trade-off in steganography between the number of embedding changes and their amplitude. We assume that each element of the cover image is assigned a sc...
Jessica J. Fridrich
OOPSLA
1999
Springer
14 years 13 days ago
Reducing Transfer Delay Using Java Class File Splitting and Prefetching
The proliferation of the Internet is fueling the development of mobile computing environments in which mobile code is executed on remote sites. In such environments, the end user ...
Chandra Krintz, Brad Calder, Urs Hölzle