Sciweavers

698 search results - page 36 / 140
» Evaluating Key Statements Analysis
Sort
View
IWMM
2011
Springer
206views Hardware» more  IWMM 2011»
13 years 24 days ago
A comprehensive evaluation of object scanning techniques
At the heart of all garbage collectors lies the process of identifying and processing reference fields within an object. Despite its key role, and evidence of many different impl...
Robin Garner, Stephen M. Blackburn, Daniel Frampto...
ATAL
2003
Springer
14 years 3 months ago
Role allocation and reallocation in multiagent teams: towards a practical analysis
Despite the success of the BDI approach to agent teamwork, initial role allocation (i.e. deciding which agents to allocate to key roles in the team) and role reallocation upon fai...
Ranjit Nair, Milind Tambe, Stacy Marsella
SACRYPT
2001
Springer
130views Cryptology» more  SACRYPT 2001»
14 years 2 months ago
On the Complexity of Matsui's Attack
Linear cryptanalysis remains the most powerful attack against DES at this time. Given 243 known plaintext-ciphertext pairs, Matsui expected a complexity of less than 243 DES evalua...
Pascal Junod
IDA
2009
Springer
14 years 4 months ago
Estimating Squared-Loss Mutual Information for Independent Component Analysis
Abstract. Accurately evaluating statistical independence among random variables is a key component of Independent Component Analysis (ICA). In this paper, we employ a squared-loss ...
Taiji Suzuki, Masashi Sugiyama
JCM
2006
129views more  JCM 2006»
13 years 10 months ago
Analysis of UWB Interference to MPSK Narrowband Receivers
This paper studies the in-band interference of time-hopping spread spectrum (TH-SS) ultra-wideband (UWB) signals to narrowband receivers. Based on the analysis of general power spe...
Dongsong Zeng, Amir I. Zaghloul, Annamalai Annamal...