Sciweavers

1722 search results - page 215 / 345
» Generating Tests from Counterexamples
Sort
View
DATE
2008
IEEE
100views Hardware» more  DATE 2008»
14 years 3 months ago
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme
There have been serious concerns recently about the security of microchips from hardware trojan horse insertion during manufacturing. This issue has been raised recently due to ou...
Francis G. Wolff, Christos A. Papachristou, Swarup...
AINA
2006
IEEE
14 years 3 months ago
Simulation Architecture for Data Processing Algorithms in Wireless Sensor Networks
Abstract— Wireless sensor networks, by providing an unprecedented way of interacting with the physical environment, have become a hot topic for research over the last few years. ...
Yann-Aël Le Borgne, Mehdi Moussaid, Gianluca ...
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
14 years 2 months ago
Greedy, genetic, and greedy genetic algorithms for the quadratic knapsack problem
Augmenting an evolutionary algorithm with knowledge of its target problem can yield a more effective algorithm, as this presentation illustrates. The Quadratic Knapsack Problem e...
Bryant A. Julstrom
NSPW
2004
ACM
14 years 2 months ago
The user non-acceptance paradigm: INFOSEC's dirty little secret
(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...
ICBA
2004
Springer
171views Biometrics» more  ICBA 2004»
14 years 2 months ago
Face Recognition with 3D Model-Based Synthesis
Abstract. Current appearance-based face recognition system encounters the difficulty to recognize faces with appearance variations, while only a small number of training images are...
Xiaoguang Lu, Rein-Lien Hsu, Anil K. Jain, Behrooz...