Sciweavers

674 search results - page 35 / 135
» Telephony in the Year 2005
Sort
View
ATAL
2005
Springer
14 years 3 months ago
Behavior transfer for value-function-based reinforcement learning
Temporal difference (TD) learning methods [22] have become popular reinforcement learning techniques in recent years. TD methods have had some experimental successes and have been...
Matthew E. Taylor, Peter Stone
AUSAI
2005
Springer
14 years 3 months ago
New Fuzzy Skin Model for Face Detection
Abstract. We discuss the face detection method by using skin information. Skin color has proven to be a useful and robust cue for face detection, localization and tracking. Numerou...
Moon Hwan Kim, Jin Bae Park, Young Hoon Joo
CC
2005
Springer
134views System Software» more  CC 2005»
14 years 3 months ago
Jazz: A Tool for Demand-Driven Structural Testing
Software testing to produce reliable and robust software has become vitally important in recent years. Testing is a process by which software quality can be assured through the co...
Jonathan Misurda, James A. Clause, Juliya L. Reed,...
CHES
2005
Springer
80views Cryptology» more  CHES 2005»
14 years 3 months ago
Successfully Attacking Masked AES Hardware Implementations
During the last years, several masking schemes for AES have been proposed to secure hardware implementations against DPA attacks. In order to investigate the effectiveness of thes...
Stefan Mangard, Norbert Pramstaller, Elisabeth Osw...
CHES
2005
Springer
100views Cryptology» more  CHES 2005»
14 years 3 months ago
Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints
During the last years, several logic styles that counteract side-channel attacks have been proposed. They all have in common that their level of resistance heavily depends on imple...
Thomas Popp, Stefan Mangard