Sciweavers

3891 search results - page 743 / 779
» Toward nature-inspired computing
Sort
View
ASIACRYPT
2009
Springer
14 years 4 months ago
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
Abstract. Physical attacks on cryptographic implementations and devices have become crucial. In this context a recent line of research on a new class of side-channel attacks, calle...
Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi,...
ATAL
2009
Springer
14 years 4 months ago
Self-deceptive decision making: normative and descriptive insights
Computational modeling of human belief maintenance and decision-making processes has become increasingly important for a wide range of applications. We present a framework for mod...
Jonathan Y. Ito, David V. Pynadath, Stacy C. Marse...
GECCO
2009
Springer
130views Optimization» more  GECCO 2009»
14 years 4 months ago
The impact of jointly evolving robot morphology and control on adaptation rate
Embodied cognition emphasizes that intelligent behavior results from the coupled dynamics between an agent’s body, brain and environment. In response to this, several projects h...
Josh C. Bongard
OOPSLA
2009
Springer
14 years 4 months ago
A market-based approach to software evolution
Software correctness has bedeviled the field of computer science since its inception. Software complexity has increased far more quickly than our ability to control it, reaching ...
David F. Bacon, Yiling Chen, David C. Parkes, Malv...
MOBICOM
2009
ACM
14 years 4 months ago
Scheduling partition for order optimal capacity in large-scale wireless networks
The capacity scaling property specifies the changes in network throughput when network size increases and serves as an essential performance evaluation metric for large-scale wir...
Yi Xu, Wenye Wang