Sciweavers

983 search results - page 118 / 197
» Negative-Weight Cycle Algorithms
Sort
View
103
Voted
AHS
2006
IEEE
188views Hardware» more  AHS 2006»
15 years 4 months ago
Finite State Machine IP Watermarking: A Tutorial
Sharing Intellectual Property (IP) blocks in today's competitive market poses significant high security risks. In this paper, we present a tutorial for a watermarking approach...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
CCGRID
2004
IEEE
15 years 4 months ago
Evolutionary molecular structure determination using Grid-enabled data mining
A new computational framework is developed for the evolutionary determination of molecular crystal structures using the Shake-and-Bake methodology. Genetic algorithms are performe...
Mark L. Green, Russ Miller
141
Voted
AICCSA
2008
IEEE
254views Hardware» more  AICCSA 2008»
15 years 2 months ago
Integrating software development security activities with agile methodologies
Because of several vulnerabilities in software products and high amount of damage caused by them, software developers are enforced to produce more secure systems. Software grows u...
Hossein Keramati, Seyed-Hassan Mirian-Hosseinabadi
106
Voted
CATS
2007
15 years 2 months ago
Some Structural and Geometric Properties of Two-Connected Steiner Networks
We consider the problem of constructing a shortest Euclidean 2-connected Steiner network (SMN) for a set of terminals. This problem has natural applications in the design of survi...
K. Hvam, L. Reinhardt, Pawel Winter, Martin Zachar...
91
Voted
ICAI
2004
15 years 2 months ago
Action Inhibition
An explicit exploration strategy is necessary in reinforcement learning (RL) to balance the need to reduce the uncertainty associated with the expected outcome of an action and the...
Myriam Abramson