Sciweavers

3101 search results - page 346 / 621
» Composing Adaptive Software
Sort
View
HVEI
2009
15 years 2 months ago
Color rendering indices in global illumination methods
Human perception of material colors depends heavily on the nature of the light sources that are used for illumination. One and the same object can cause highly different color impr...
David Geisler-Moroder, Arne Dür
TFS
2011
194views Education» more  TFS 2011»
14 years 11 months ago
Top-Down Induction of Fuzzy Pattern Trees
Fuzzy pattern tree induction was recently introduced as a novel machine learning method for classification. Roughly speaking, a pattern tree is a hierarchical, tree-like structur...
R. Senge, Eyke Hüllermeier
ICASSP
2011
IEEE
14 years 8 months ago
Reconfigurable decoder architectures for Raptor codes
Decoder architectures for architecture-aware Raptor codes having regular message access-and-processing patterns are presented. Raptor codes are a class of concatenated codes compo...
Hady Zeineddine, Mohammad M. Mansour
IACR
2011
105views more  IACR 2011»
14 years 4 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
135
Voted
AAAI
2012
13 years 7 months ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...