Sciweavers

721 search results - page 143 / 145
» A new approach to artificial neural networks
Sort
View
TPHOL
2009
IEEE
15 years 4 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
GECCO
2009
Springer
143views Optimization» more  GECCO 2009»
15 years 4 months ago
Exploiting hierarchical clustering for finding bounded diameter minimum spanning trees on euclidean instances
The bounded diameter minimum spanning tree problem is an NP-hard combinatorial optimization problem arising, for example, in network design when quality of service is of concern. ...
Martin Gruber, Günther R. Raidl
LPAR
2007
Springer
15 years 3 months ago
Deciding Knowledge in Security Protocols for Monoidal Equational Theories
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Véronique Cortier, Stéphanie Delaune
EUROS
2008
177views Robotics» more  EUROS 2008»
14 years 11 months ago
Eyes-Neck Coordination Using Chaos
Abstract. The increasing complexity of humanoid robots and their expected performance in real dynamic environments demand an equally complex, autonomous and dynamic solution. Our a...
Boris Duran, Yasuo Kuniyoshi, Giulio Sandini
IUI
2005
ACM
15 years 3 months ago
Designing interfaces for guided collection of knowledge about everyday objects from volunteers
A new generation of intelligent applications can be enabled by broad-coverage knowledge repositories about everyday objects. We distill lessons in design of intelligent user inter...
Timothy Chklovski