Sciweavers

890 search results - page 178 / 178
» Comparative expert reviews
Sort
View
CP
2011
Springer
12 years 5 months ago
Hierarchically Nested Convex VCSP
We introduce tractable classes of VCSP instances based on convex cost functions. Firstly, we show that the class of VCSP instances satisfying the hierarchically nested convexity pr...
Martin C. Cooper, Stanislav Zivny
IACR
2011
86views more  IACR 2011»
12 years 4 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
ER
2007
Springer
237views Database» more  ER 2007»
13 years 11 months ago
Business Process and Business Rule Modeling Languages for Compliance Management: A Representational Analysis
Organizations are under increasing scrutiny to document their compliance to regulatory requirements. To this end, they have to formally document their operating procedures to supp...
Michael zur Muehlen, Marta Indulska, Gerrit Kamp
IPMI
2003
Springer
13 years 10 months ago
CAD Tool for Burn Diagnosis
In this paper, a novel region growing algorithm for segmenting burn wounds in digital photographs of the skin is presented. This segmentation step has been developed as part of a C...
Begoña Acha, Carmen Serrano, José I....
GECCO
2003
Springer
201views Optimization» more  GECCO 2003»
13 years 10 months ago
Solving Mastermind Using Genetic Algorithms
The MasterMind game involves decoding a secret code. The classic game is a code of six possible colors in four slots. The game has been analyzed and optimal strategies have been po...
Tom Kalisker, Doug Camens