Sciweavers

1711 search results - page 114 / 343
» Completing pseudojump operators
Sort
View
ACNS
2003
Springer
147views Cryptology» more  ACNS 2003»
14 years 1 months ago
Side-Channel Attack on Substitution Blocks
1 We describe a side-channel attack on a substitution block, which is usually implemented as a table lookup operation. In particular, we have investigated smartcard implementations...
Roman Novak
EUROCAST
2003
Springer
105views Hardware» more  EUROCAST 2003»
14 years 1 months ago
A Self-adaptive Model for Selective Pressure Handling within the Theory of Genetic Algorithms
In this paper we introduce a new generic selection method for Genetic Algorithms. The main difference of this selection principle in contrast to conventional selection models is g...
Michael Affenzeller, Stefan Wagner 0002
ICRA
2002
IEEE
75views Robotics» more  ICRA 2002»
14 years 1 months ago
First Experiment in Sun-Synchronous Exploration
Sun-synchronous exploration is accomplished by reasoning about sunlight: where the Sun is in the sky, where and when shadows will fall, and how much power can be obtained through ...
David Wettergreen, M. Bernardine Dias, Benjamin Sh...
CPAIOR
2010
Springer
14 years 26 days ago
A Constraint Integer Programming Approach for Resource-Constrained Project Scheduling
Abstract. We propose a hybrid approach for solving the resource-constrained project scheduling problem which is an extremely hard to solve combinatorial optimization problem of pra...
Timo Berthold, Stefan Heinz, Marco E. Lübbeck...
ICALP
2010
Springer
14 years 26 days ago
Automata for Coalgebras: An Approach Using Predicate Liftings
Universal Coalgebra provides the notion of a coalgebra as the natural mathematical generalization of state-based evolving systems such as (infinite) words, trees, and transition s...
Gaëlle Fontaine, Raul Andres Leal, Yde Venema