Sciweavers

4343 search results - page 24 / 869
» Segmentation from a Box
Sort
View
CHES
2006
Springer
134views Cryptology» more  CHES 2006»
14 years 1 months ago
Read-Proof Hardware from Protective Coatings
In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient beca...
Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan v...
CORR
2010
Springer
236views Education» more  CORR 2010»
13 years 4 months ago
Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes
As more and more multi-tier services are developed from commercial off-the-shelf components or heterogeneous middleware without source code available, both developers and administr...
Bo Sang, Jianfeng Zhan, Zhihong Zhang, Lei Wang, D...
IBPRIA
2007
Springer
14 years 4 months ago
Shadow Resistant Road Segmentation from a Mobile Monocular System
Abstract. An essential functionality for advanced driver assistance systems (ADAS) is road segmentation, which directly supports ADAS applications like road departure warning and i...
José Manuel Álvarez, Antonio M. L&oa...
IEAAIE
1994
Springer
14 years 1 months ago
Using the Genetic Algorithm to Find Snake-in-the-Box Codes
Genetic Algorithms are heuristic search schemes based on a model of Darwinian evolution. Although not guaranteed to find the optimal solution, genetic algorithms have been shown t...
Walter D. Potter, Robert W. Robinson, John A. Mill...
POPL
1994
ACM
14 years 1 months ago
Formally Optimal Boxing
An important implementation decision in polymorphically typed functional programming languages is whether to represent data in boxed or unboxed form and when to transform them fro...
Fritz Henglein, Jesper Jørgensen