Sciweavers

1984 search results - page 242 / 397
» Binary Component Adaptation
Sort
View
SIGOPSE
2004
ACM
15 years 10 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
MHCI
2004
Springer
15 years 9 months ago
Smartphone Views: Building Multi-device Distributed User Interfaces
Abstract. This paper introduces a prototype of a distributed user interface (DUI) on dual devices, a workstation and a Windows Mobilepowered smartphone. By porting the XML-complian...
Micael Sjölund, Anders Larsson, Erik Berglund
ICANN
2003
Springer
15 years 9 months ago
Knowledge Refinement Using Fuzzy Compositional Neural Networks
Fuzzy relations as representational tools and fuzzy compositional operators as reasoning components, are user in this paper in order to represent knowledge expressed in semantic ru...
Vassilis Tzouvaras, Giorgos B. Stamou, Stefanos D....
GECCO
1999
Springer
111views Optimization» more  GECCO 1999»
15 years 8 months ago
On using ZCS in a Simulated Continuous Double-Auction Market
This paper presents results from on-going investigations into the performance of the Michiganstyle classifier system in a complex multi-agent environment. Using a simplified model...
Larry Bull
BILDMED
2008
100views Algorithms» more  BILDMED 2008»
15 years 6 months ago
Detection of Point Scatterers by Regularized Inversion of a Linear Ultrasound System Model
Abstract. Scatterer detection in medical ultrasound imaging can be formulated as an inverse problem concerning a linear system model based on point scatterers. The applicability of...
Tobias Gehrke, Heinrich M. Overhoff