Sciweavers

10901 search results - page 2128 / 2181
» Approximations in Distributed Optimization
Sort
View
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
15 years 8 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
EMSOFT
2005
Springer
15 years 8 months ago
A sink-n-hoist framework for leakage power reduction
Power leakage constitutes an increasing fraction of the total power consumption in modern semiconductor technologies. Recent research efforts have tried to integrate architecture...
Yi-Ping You, Chung-Wen Huang, Jenq Kuen Lee
GECCO
2005
Springer
161views Optimization» more  GECCO 2005»
15 years 8 months ago
Autonomous navigation system applied to collective robotics with ant-inspired communication
Research in collective robotics is motivated mainly by the possibility of achieving an efficient solution to multi-objective navigation tasks when multiple robots are employed, in...
Renato Reder Cazangi, Fernando J. Von Zuben, Maur&...
GECCO
2005
Springer
171views Optimization» more  GECCO 2005»
15 years 8 months ago
Behaviorally coupled emergent representation
Traditionally, representation has been perceived as a necessity for producing intelligent behavior. Once the right representation is in place to drive it, behavior unfolds as the ...
Joseph Lewis, Jamie Lawson
GECCO
2005
Springer
160views Optimization» more  GECCO 2005»
15 years 8 months ago
Exploring relationships between genotype and oral cancer development through XCS
In medical research, being able to justify decisions is generally as important as taking the right ones. Interpretability is then one of the chief characteristics a learning algor...
Alessandro Passaro, Flavio Baronti, Valentina Magg...
« Prev « First page 2128 / 2181 Last » Next »