Sciweavers

1981 search results - page 290 / 397
» The State of Change: A Survey
Sort
View
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
14 years 4 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
ECAL
2007
Springer
14 years 4 months ago
Measuring Entropy in Embodied Neural Agents with Homeostasic Units: A Link Between Complexity and Cybernetics
Abstract. We present a model of a recurrent neural network with homeostasic units, embodied in a minimalist articulated agent with a single link and joint. The configuration of th...
Jorge Simão
GECCO
2007
Springer
157views Optimization» more  GECCO 2007»
14 years 4 months ago
Convergence phases, variance trajectories, and runtime analysis of continuous EDAs
Considering the available body of literature on continuous EDAs, one must state that many important questions are still unanswered, e.g.: How do continuous EDAs really work, and h...
Jörn Grahl, Peter A. N. Bosman, Stefan Minner
GECCO
2007
Springer
168views Optimization» more  GECCO 2007»
14 years 4 months ago
Stability in the self-organized evolution of networks
The modeling and analysis of large networks of autonomous agents is an important topic with applications in many different disciplines. One way of modeling the development of such...
Thomas Jansen, Madeleine Theile
OTM
2007
Springer
14 years 4 months ago
Processing Location-Dependent Queries with Location Granules
Existing approaches for the processing of location-dependent queries implicitly assume location data expressed at maximum precision (e.g., GPS). However, there exist applications w...
Sergio Ilarri, Eduardo Mena, Carlos Bobed