Sciweavers

13414 search results - page 2572 / 2683
» The distributed boosting algorithm
Sort
View
138
Voted
DRM
2007
Springer
15 years 8 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
ESORICS
2007
Springer
15 years 8 months ago
Cloak: A Ten-Fold Way for Reliable Covert Communications
A number of network covert channels have been proposed recently that may have important ramifications for Internet security and privacy. However, they could become ineffective in...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
EUROCAST
2007
Springer
182views Hardware» more  EUROCAST 2007»
15 years 8 months ago
A k-NN Based Perception Scheme for Reinforcement Learning
Abstract a paradigm of modern Machine Learning (ML) which uses rewards and punishments to guide the learning process. One of the central ideas of RL is learning by “direct-online...
José Antonio Martin H., Javier de Lope Asia...
EUROSSC
2007
Springer
15 years 8 months ago
The Design of a Pressure Sensing Floor for Movement-Based Human Computer Interaction
This paper addresses the design of a large area, high resolution, networked pressure sensing floor with primary application in movement-based human-computer interaction (M-HCI). T...
Sankar Rangarajan, Assegid Kidané, Gang Qia...
FMICS
2007
Springer
15 years 8 months ago
An Approach to Formalization and Analysis of Message Passing Libraries
Message passing using libraries implementing the Message Passing Interface (MPI) standard is the dominant communication mechanism in high performance computing (HPC) applications. ...
Robert Palmer, Michael Delisi, Ganesh Gopalakrishn...
« Prev « First page 2572 / 2683 Last » Next »