Sciweavers

3955 search results - page 40 / 791
» Comparing the Power of Robots
Sort
View
GECCO
2010
Springer
190views Optimization» more  GECCO 2010»
14 years 2 months ago
Comparing the (1+1)-CMA-ES with a mirrored (1+2)-CMA-ES with sequential selection on the noiseless BBOB-2010 testbed
In this paper, we compare the (1+1)-CMA-ES to the (1+2s m)CMA-ES, a recently introduced quasi-random (1+2)-CMAES that uses mirroring as derandomization technique as well as a sequ...
Anne Auger, Dimo Brockhoff, Nikolaus Hansen
SC
2009
ACM
14 years 2 months ago
Comparative study of one-sided factorizations with multiple software packages on multi-core hardware
The emergence and continuing use of multi-core architectures require changes in the existing software and sometimes even a redesign of the established algorithms in order to take ...
Emmanuel Agullo, Bilel Hadri, Hatem Ltaief, Jack D...
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
14 years 2 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
CHI
2007
ACM
14 years 2 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
WICON
2008
13 years 11 months ago
Comparative performance evaluation of idle mode location management schemes for IEEE 802.16j multihop relay networks
IEEE 802.16 WiMAX is a promising technology to provide broadband wireless networking access. IEEE 802.16j Mobile Multihop Relay standard introduces multihop relaying to WiMAX syst...
Kuan-Po Lin, Hung-Yu Wei