Sciweavers

481 search results - page 44 / 97
» Acceleration of behavioral simulation on simulation specific...
Sort
View
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
15 years 5 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
ICML
2005
IEEE
16 years 19 days ago
Large scale genomic sequence SVM classifiers
In genomic sequence analysis tasks like splice site recognition or promoter identification, large amounts of training sequences are available, and indeed needed to achieve suffici...
Bernhard Schölkopf, Gunnar Rätsch, S&oum...
AAAI
2006
15 years 1 months ago
Know Thine Enemy: A Champion RoboCup Coach Agent
In a team-based multiagent system, the ability to construct a model of an opponent team's joint behavior can be useful for determining an agent's expected distribution o...
Gregory Kuhlmann, William B. Knox, Peter Stone
ICRA
2003
IEEE
110views Robotics» more  ICRA 2003»
15 years 5 months ago
Template based control of hexapedal running
In this paper, we introduce a new hexapedal locomotion controller that simulation evidence suggests will be capable of driving our RHex robot at speeds exceeding five body length...
Uluc Saranli, Daniel E. Koditschek
IPPS
2005
IEEE
15 years 5 months ago
Benchmarking the CLI for I/O-Intensive Computing
Common Language Infrastructure, or CLI, is a standardized virtual machine, which increasingly becomes popular on a wide range of platforms. In this paper we developed three I/O-in...
Xiao Qin, Tao Xie 0004, Ahalya Nathan, Vijaya K. T...