Sciweavers

2048 search results - page 356 / 410
» Intelligent search techniques for large software systems
Sort
View
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
15 years 9 months ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
147
Voted
CCS
2007
ACM
15 years 10 months ago
Privacy-preserving remote diagnostics
We present an efficient protocol for privacy-preserving evaluation of diagnostic programs, represented as binary decision trees or branching programs. The protocol applies a bran...
Justin Brickell, Donald E. Porter, Vitaly Shmatiko...
151
Voted
AOSE
2005
Springer
15 years 10 months ago
Improving AOSE with an Enriched Modelling Framework
Many approaches and tools assist the various tasks required to develop a multi-agent system (MAS), yet there still remains a gap between the generation of MAS models and program co...
Richard Hill, Simon Polovina, Martin D. Beer
GECCO
2005
Springer
162views Optimization» more  GECCO 2005»
15 years 10 months ago
A framework for learning coordinated behavior
We sketch a framework for learning structured coordinated behavior, specifically the tactical behavior of Experimental Unmanned Vehicles (XUVs). We conceptualize an XUV unit as a ...
Albert C. Esterline, Chafic BouSaba, Abdollah Homa...
145
Voted
ICAI
2008
15 years 6 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang