Sciweavers

12052 search results - page 2161 / 2411
» computer 2010
Sort
View
VLSI
2010
Springer
13 years 5 months ago
Spatial EM jamming: A countermeasure against EM Analysis?
Electro-Magnetic Analysis has been identified as an efficient technique to retrieve the secret key of cryptographic algorithms. Although similar mathematically speaking, Power or E...
Francois Poucheret, Lyonel Barthe, Pascal Benoit, ...
VLSI
2010
Springer
13 years 5 months ago
SESAM extension for fast MPSoC architectural exploration and dynamic streaming applications
Future systems will have to support multiple and concurrent dynamic compute-intensive applications, while respecting real-time and energy consumption constraints. To overcome these...
Nicolas Ventroux, Tanguy Sassolas, Raphael David, ...
CORR
2011
Springer
165views Education» more  CORR 2011»
13 years 2 months ago
Finding Deceptive Opinion Spam by Any Stretch of the Imagination
Consumers increasingly go online to rate, review and research products (Jansen, 2010; Litvin et al., 2008). Consequently, websites containing these reviews are becoming targets of...
Myle Ott, Yejin Choi, Claire Cardie, Jeffrey T. Ha...
CEC
2010
IEEE
13 years 2 months ago
Co-evolutionary search path planning under constrained information-sharing for a cooperative unmanned aerial vehicle team
—Mobile cooperative sensor networks are increasingly used for surveillance and reconnaissance tasks to support domain picture compilation. However, efficient distributed informat...
Jean Berger, Jens Happe
CEC
2010
IEEE
13 years 2 months ago
Tweaking a tower of blocks leads to a TMBL: Pursuing long term fitness growth in program evolution
— If a population of programs evolved not for a few hundred generations but for a few hundred thousand or more, could it generate more interesting behaviours and tackle more comp...
Tony E. Lewis, George D. Magoulas
« Prev « First page 2161 / 2411 Last » Next »