Sciweavers

13827 search results - page 2700 / 2766
» The state of artificial intelligence
Sort
View
DRM
2007
Springer
14 years 3 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
DRM
2007
Springer
14 years 3 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
EPIA
2007
Springer
14 years 3 months ago
An Omnidirectional Vision System for Soccer Robots
This paper describes a complete and efficient vision system developed for the robotic soccer team of the University of Aveiro, CAMBADA (Cooperative Autonomous Mobile roBots with A...
António J. R. Neves, Gustavo A. Corrente, A...
GECCO
2007
Springer
235views Optimization» more  GECCO 2007»
14 years 3 months ago
Expensive optimization, uncertain environment: an EA-based solution
Real life optimization problems often require finding optimal solution to complex high dimensional, multimodal problems involving computationally very expensive fitness function e...
Maumita Bhattacharya
GECCO
2007
Springer
256views Optimization» more  GECCO 2007»
14 years 3 months ago
A particle swarm optimization approach for estimating parameter confidence regions
Point estimates of the parameters in real world models convey valuable information about the actual system. However, parameter comparisons and/or statistical inference requires de...
Praveen Koduru, Stephen Welch, Sanjoy Das
« Prev « First page 2700 / 2766 Last » Next »