Sciweavers

5339 search results - page 875 / 1068
» Controllable Delay-Insensitive Processes
Sort
View
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
15 years 10 months ago
Security Limits for Compromising Emanations
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanat...
Markus G. Kuhn
ECAL
2005
Springer
15 years 10 months ago
On Convergence of Dynamic Cluster Formation in Multi-agent Networks
Efficient hierarchical architectures for reconfigurable and adaptive multi-agent networks require dynamic cluster formation among the set of nodes (agents). In the absence of cen...
Mikhail Prokopenko, Piraveenan Mahendra rajah, Pet...
EMSOFT
2005
Springer
15 years 10 months ago
Synchronization of periodic clocks
We propose a programming model dedicated to real-time videostreaming applications for embedded media devices, including highdefinition TVs. This model is built on the synchronous...
Albert Cohen, Marc Duranton, Christine Eisenbeis, ...
GECCO
2005
Springer
140views Optimization» more  GECCO 2005»
15 years 10 months ago
Isolating the benefits of respect
The three mechanisms of crossover are transmission, assortment, and respect. Of these three mechanisms, assortment (i.e. recombination) is traditionally viewed as the primary feat...
Stephen Chen, Gregory Pitt
GECCO
2005
Springer
108views Optimization» more  GECCO 2005»
15 years 10 months ago
Some theoretical results about the computation time of evolutionary algorithms
This paper focuses on the computation time of evolutionary algorithms. First, some exact expressions of the mean first hitting times of general evolutionary algorithms in finite...
Lixin X. Ding, Jinghu Yu