Sciweavers

3955 search results - page 40 / 791
» Comparing the Power of Robots
Sort
View
GECCO
2010
Springer
190views Optimization» more  GECCO 2010»
15 years 7 months ago
Comparing the (1+1)-CMA-ES with a mirrored (1+2)-CMA-ES with sequential selection on the noiseless BBOB-2010 testbed
In this paper, we compare the (1+1)-CMA-ES to the (1+2s m)CMA-ES, a recently introduced quasi-random (1+2)-CMAES that uses mirroring as derandomization technique as well as a sequ...
Anne Auger, Dimo Brockhoff, Nikolaus Hansen
SC
2009
ACM
15 years 7 months ago
Comparative study of one-sided factorizations with multiple software packages on multi-core hardware
The emergence and continuing use of multi-core architectures require changes in the existing software and sometimes even a redesign of the established algorithms in order to take ...
Emmanuel Agullo, Bilel Hadri, Hatem Ltaief, Jack D...
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 7 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
CHI
2007
ACM
15 years 7 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
WICON
2008
15 years 4 months ago
Comparative performance evaluation of idle mode location management schemes for IEEE 802.16j multihop relay networks
IEEE 802.16 WiMAX is a promising technology to provide broadband wireless networking access. IEEE 802.16j Mobile Multihop Relay standard introduces multihop relaying to WiMAX syst...
Kuan-Po Lin, Hung-Yu Wei