Sciweavers

2075 search results - page 291 / 415
» aims 2007
Sort
View
125
Voted
ISW
2007
Springer
15 years 10 months ago
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
NLS is a stream cipher which was submitted to eSTREAM project. A linear distinguishing attack against NLS was presented by Cho and Pieprzyk, which was called as Crossword Puzzle at...
Joo Yeon Cho, Josef Pieprzyk
127
Voted
ISW
2007
Springer
15 years 10 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
IWCLS
2007
Springer
15 years 10 months ago
Revisiting UCS: Description, Fitness Sharing, and Comparison with XCS
Abstract. This paper provides a deep insight into the learning mechanisms of UCS, a learning classifier system (LCS) derived from XCS that works under a supervised learning scheme...
Albert Orriols-Puig, Ester Bernadó-Mansilla
IWCLS
2007
Springer
15 years 10 months ago
On Lookahead and Latent Learning in Simple LCS
Learning Classifier Systems use evolutionary algorithms to facilitate rule- discovery, where rule fitness is traditionally payoff based and assigned under a sharing scheme. Most c...
Larry Bull
JSAI
2007
Springer
15 years 10 months ago
Consideration of Infants' Vocal Imitation Through Modeling Speech as Timbre-Based Melody
Abstract. Infants acquire spoken language through hearing and imitating utterances mainly from their parents [1,2,3] but never imitate their parents’ voices as they are. What in ...
Nobuaki Minematsu, Tazuko Nishimura