Sciweavers

1916 search results - page 362 / 384
» Reconfiguring a state machine
Sort
View
ATAL
2005
Springer
14 years 2 months ago
Modeling exceptions via commitment protocols
This paper develops a model for exceptions and an approach for incorporating them in commitment protocols among autonomous agents. Modeling and handling exceptions is critical for...
Ashok U. Mallya, Munindar P. Singh
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
DIGRA
2005
Springer
14 years 2 months ago
A Cognitive Psychological Approach to Gameplay Emotions
Although emotions elicited by the fictional world or the artefact play a part in story-driven video games, they are certainly not the focus of the experience. From a cognitive psy...
Bernard Perron
HYBRID
2005
Springer
14 years 2 months ago
Mode-Automata Based Methodology for Scade
In this paper, we present a new design methodology for synchronous reactive systems, based on a clear separation between control and data flow parts. This methodology allows to fa...
Ouassila Labbani, Jean-Luc Dekeyser, Pierre Boulet
ICANN
2005
Springer
14 years 2 months ago
A Neural Network Model for Inter-problem Adaptive Online Time Allocation
One aim of Meta-learning techniques is to minimize the time needed for problem solving, and the effort of parameter hand-tuning, by automating algorithm selection. The predictive m...
Matteo Gagliolo, Jürgen Schmidhuber