Sciweavers

7280 search results - page 1434 / 1456
» Adaptive bases for Q-learning
Sort
View
JCS
2006
116views more  JCS 2006»
15 years 1 months ago
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks. Our protocol exploits the property of ad hoc networks that each membe...
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jaj...
JSW
2008
124views more  JSW 2008»
15 years 1 months ago
Information Storage and Retrieval Schemes for Recycling Products
A recycling object is in its recycle chain and its status may often change according to recycling stage or reusing status; even its structure could often dynamically change accordi...
Takayuki Tsuchida, Teppei Shimada, Tatsuo Tsuji, K...
115
Voted
JUCS
2008
156views more  JUCS 2008»
15 years 1 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
JSA
2006
97views more  JSA 2006»
15 years 1 months ago
Dynamic feature selection for hardware prediction
It is often possible to greatly improve the performance of a hardware system via the use of predictive (speculative) techniques. For example, the performance of out-of-order micro...
Alan Fern, Robert Givan, Babak Falsafi, T. N. Vija...
ENTCS
2007
97views more  ENTCS 2007»
15 years 1 months ago
Safety-Oriented Design of Component Assemblies using Safety Interfaces
This paper promotes compositional reasoning in the context of safety-critical systems, and demonstrates a safety-oriented component model using an application from the automotive ...
Jonas Elmqvist, Simin Nadjm-Tehrani
« Prev « First page 1434 / 1456 Last » Next »