Sciweavers

881 search results - page 96 / 177
» A Model of Tolerance
Sort
View
JSW
2006
98views more  JSW 2006»
14 years 9 months ago
A Jxta Based Asynchronous Peer-to-Peer Implementation of Genetic Programming
Abstract-- Solving complex real-world problems using evolutionary computation is a CPU time-consuming task that requires a large amount of computational resources. Peerto-Peer (P2P...
Gianluigi Folino, Agostino Forestiero, Giandomenic...
WSCG
2004
146views more  WSCG 2004»
14 years 11 months ago
Frequency-based Operators for Freeform Feature Shape Reuse
Freeform feature shape reuse is an important issue in industrial design supporting. In this paper, the frequencybased operators for freeform feature shape reuse are discussed. Unl...
Chensheng Wang, Joris S. M. Vergeest, Yu Song
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
GLVLSI
2006
IEEE
115views VLSI» more  GLVLSI 2006»
15 years 3 months ago
Yield enhancement of asynchronous logic circuits through 3-dimensional integration technology
This paper presents a systematic design methodology for yield enhancement of asynchronous logic circuits using 3-D (3-Dimensional) integration technology. In this design, the targ...
Song Peng, Rajit Manohar
BMCBI
2004
185views more  BMCBI 2004»
14 years 9 months ago
Linear fuzzy gene network models obtained from microarray data by exhaustive search
Background: Recent technological advances in high-throughput data collection allow for experimental study of increasingly complex systems on the scale of the whole cellular genome...
Bahrad A. Sokhansanj, J. Patrick Fitch, Judy N. Qu...