Sciweavers

419 search results - page 65 / 84
» Strategic Evaluation in Complex Domains
Sort
View
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
14 years 9 days ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
3DPVT
2004
IEEE
14 years 5 days ago
Robust Concealment for Erroneous Block Bursts in Stereoscopic Images
With the increasing number of image communication applications especially in the low complexity domain, error concealment has become a very important field of research. Since many...
Sebastian Knorr, Carsten Clemens, Matthias Kunter,...
ESOP
2006
Springer
14 years 3 days ago
Step-Indexed Syntactic Logical Relations for Recursive and Quantified Types
We present a sound and complete proof technique, based on syntactic logical relations, for showing contextual equivalence of expressions in a -calculus with recursive types and imp...
Amal J. Ahmed
EUROPAR
2006
Springer
14 years 2 days ago
Private Virtual Cluster: Infrastructure and Protocol for Instant Grids
Given current complexity of Grid technologies, the lack of security of P2P systems and the rigidity of VPN technologies make sharing resources belonging to different institutions s...
Ala Rezmerita, Tangui Morlier, Vincent Néri...
GECCO
2010
Springer
174views Optimization» more  GECCO 2010»
13 years 12 months ago
Real-coded genetic algorithm benchmarked on noiseless black-box optimization testbed
Genetic algorithms—a class of stochastic population-based optimization techniques—have been widely realized as the effective tools to solve complicated optimization problems ...
Thanh-Do Tran, Gang-Gyoo Jin