Sciweavers

796 search results - page 49 / 160
» Spoofing prevention method
Sort
View
AUSAI
2009
Springer
14 years 4 months ago
Simple Default Reasoning in Theories of Action
We extend a recent approach to integrate action formalisms and non-monotonic reasoning. The resulting framework allows an agent employing an action theory as internal world model t...
Hannes Strass, Michael Thielscher
CIKM
2009
Springer
14 years 4 months ago
Agglomerating local patterns hierarchically with ALPHA
To increase the relevancy of local patterns discovered from noisy relations, it makes sense to formalize error-tolerance. Our starting point is to address the limitations of state...
Loïc Cerf, Pierre-Nicolas Mougel, Jean-Fran&c...
GECCO
2009
Springer
200views Optimization» more  GECCO 2009»
14 years 4 months ago
Apply ant colony optimization to Tetris
Tetris is a falling block game where the player’s objective is to arrange a sequence of different shaped tetrominoes smoothly in order to survive. In the intelligence games, ag...
Xingguo Chen, Hao Wang, Weiwei Wang, Yinghuan Shi,...
IEEEARES
2007
IEEE
14 years 4 months ago
Secure Software Development through Coding Conventions and Frameworks
It is difficult to apply existing software development methods to security concerns. Using software for security testing purposes, in particular, is hard to do. The fact that ther...
Takao Okubo, Hidehiko Tanaka
ISCAS
2007
IEEE
120views Hardware» more  ISCAS 2007»
14 years 4 months ago
Clock Gating and Negative Edge Triggering for Energy Recovery Clock
Energy recovery clocking has been demonstrated as an effective method for reducing the clock power. In this method the conventional square wave clock signal is replaced by a sinus...
Vishwanadh Tirumalashetty, Hamid Mahmoodi