Sciweavers

1140 search results - page 173 / 228
» Progress on Certifying Algorithms
Sort
View
VCIP
2003
120views Communications» more  VCIP 2003»
13 years 11 months ago
An adaptive error-resilient video encoder
When designing an encoder for a real-time video application over a wireless channel, we must take into consideration the unpredictable fluctuation of the quality of the channel an...
Liang Cheng, Magda El Zarki
CEC
2010
IEEE
13 years 11 months ago
Coordinate System Archive for coevolution
Problems in which some entities interact with each other are common in computational intelligence. This scenario, typical for co-evolving artificial-life agents, learning strategie...
Wojciech Jaskowski, Krzysztof Krawiec
CCIA
2009
Springer
13 years 11 months ago
Anytime Reasoning Mechanism for Conversational Agents
When an agent receives a query from another agent, it tries to satisfy it by building an answer based on its current knowledge. Depending on the available time or the urgency of t...
M. Mariela Morveli-Espinoza, Josep Puyol-Gruart
CHES
2010
Springer
210views Cryptology» more  CHES 2010»
13 years 11 months ago
Flash Memory 'Bumping' Attacks
This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually s...
Sergei Skorobogatov
CIBCB
2009
IEEE
13 years 11 months ago
A framework for the application of decision trees to the analysis of SNPs data
Data mining is the analysis of experimental datasets to extract trends and relationships that can be meaningful for the user. In genetic studies these techniques have revealed inte...
Linda Fiaschi, Jonathan M. Garibaldi, Natalio Kras...