Sciweavers

6610 search results - page 1070 / 1322
» Community Structures of Networks
Sort
View
FC
2005
Springer
87views Cryptology» more  FC 2005»
15 years 9 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
GECCO
2005
Springer
120views Optimization» more  GECCO 2005»
15 years 9 months ago
Evolving visually guided agents in an ambiguous virtual world
The fundamental challenge faced by any visual system within natural environments is the ambiguity caused by the fact that light that falls on the system’s sensors conflates mult...
Ehud Schlessinger, Peter J. Bentley, R. Beau Lotto
137
Voted
ICCS
2005
Springer
15 years 9 months ago
A Computational Model of Micro-vascular Growth
In order to supply a growing tissue with oxygen and nutrients and to remove its metabolic wastes, blood vessels penetrating the tissue are formed. Multiple mechanisms are involved ...
Dominik Szczerba, Gábor Székely
122
Voted
LCTRTS
2004
Springer
15 years 8 months ago
Advanced control flow in Java card programming
Java Card technology simplifies the development of smart card applications by providing a high-level programming language similar to Java. However, the master-slave programming m...
Peng Li, Steve Zdancewic
131
Voted
SAMOS
2004
Springer
15 years 8 months ago
A Novel Data-Path for Accelerating DSP Kernels
A high-performance data-path to implement DSP kernels is proposed in this paper. The data-path is based on a flexible, universal, and regular component to optimally exploiting both...
Michalis D. Galanis, George Theodoridis, Spyros Tr...
« Prev « First page 1070 / 1322 Last » Next »