Sciweavers

825 search results - page 78 / 165
» Internal Iteration Externalized
Sort
View
ADT
2006
13 years 8 months ago
Data Confidentiality: to which extent cryptography and secured hardware can help
Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
ITSSA
2006
80views more  ITSSA 2006»
13 years 8 months ago
Self-Configuring Socio-Technical Systems: Redesign at Runtime
: Modern information systems are becoming more and more socio-technical systems, namely systems composed of human (social) agents and software (technical) systems operating togethe...
Volha Bryl, Paolo Giorgini
TRS
2008
13 years 7 months ago
A Model of User-Oriented Reduct Construction for Machine Learning
An implicit assumption of many machine learning algorithms is that all attributes are of the same importance. An algorithm typically selects attributes based solely on their statis...
Yiyu Yao, Yan Zhao, Jue Wang, Suqing Han
TVLSI
1998
123views more  TVLSI 1998»
13 years 7 months ago
On-line fault detection for bus-based field programmable gate arrays
Abstract—We introduce a technique for on-line built-in selftesting (BIST) of bus-based field programmable gate arrays (FPGA’s). This system detects deviations from the intende...
N. R. Shnidman, William H. Mangione-Smith, Miodrag...
SOCROB
2010
120views Robotics» more  SOCROB 2010»
13 years 6 months ago
Selection of Actions for an Autonomous Social Robot
Autonomy is a prime issue on robotics field and it is closely related to decision making. Last researches on decision making for social robots are focused on imitating humans’ m...
Álvaro Castro-González, Maria Malfaz...