Sciweavers

323 search results - page 34 / 65
» Verify Your Runs
Sort
View
PRL
2007
200views more  PRL 2007»
13 years 9 months ago
Generative learning of visual concepts using multiobjective genetic programming
This paper introduces a novel method of visual learning based on Genetic Programming, which evolves a population of individuals (image analysis programs) that process attributed v...
Krzysztof Krawiec
RTS
2008
131views more  RTS 2008»
13 years 9 months ago
Formal verification of multitasking applications based on timed automata model
The aim of this paper is to show, how a multitasking application running under a real-time operating system compliant with an OSEK/VDX standard can be modeled by timed automata. Th...
Libor Waszniowski, Zdenek Hanzálek
ICUMT
2009
13 years 7 months ago
A syntactic approach for identifying multi-protocol attacks
In the context of multiple security protocols running in the same environment, we propose a syntactical approach for identifying multi-protocol attacks. The proposed approach uses ...
Béla Genge, Piroska Haller
PET
2009
Springer
14 years 4 months ago
Privacy-Preserving Face Recognition
Abstract. Face recognition is increasingly deployed as a means to unobtrusively verify the identity of people. The widespread use of biometrics raises important privacy concerns, i...
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stef...
CEC
2008
IEEE
14 years 4 months ago
On the generality of the evolved driving rules of an agent operating a model of a car
—We present an approach for automated evolutionary design of the functionary of driving agent, able to operate a software model of fast running car. The objective of our work is ...
Hirotaka Yamazaki, Ivan Tanev, Tomoyuki Hiroyasu, ...