Sciweavers

2192 search results - page 216 / 439
» Embedded function composition
Sort
View
COMPSEC
2004
105views more  COMPSEC 2004»
15 years 18 days ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
GECCO
2011
Springer
256views Optimization» more  GECCO 2011»
14 years 4 months ago
Evolving complete robots with CPPN-NEAT: the utility of recurrent connections
This paper extends prior work using Compositional Pattern Producing Networks (CPPNs) as a generative encoding for the purpose of simultaneously evolving robot morphology and contr...
Joshua E. Auerbach, Josh C. Bongard
84
Voted
CRYPTO
2005
Springer
103views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Pebbling and Proofs of Work
We investigate methods for providing easy-to-check proofs of computational effort. Originally intended for discouraging spam, the concept has wide applicability as a method for co...
Cynthia Dwork, Moni Naor, Hoeteck Wee
127
Voted
ICANN
2005
Springer
15 years 6 months ago
A Hardware/Software Framework for Real-Time Spiking Systems
Abstract. One focus of recent research in the field of biologically plausible neural networks is the investigation of higher-level functions such as learning, development and modu...
Matthias Oster, Adrian M. Whatley, Shih-Chii Liu, ...
100
Voted
IJIT
2004
15 years 2 months ago
"Intuition" Operator: Providing Genomes with Reason
In this contribution, the use of a new genetic operator is proposed. The main advantage of using this operator is that it is able to assist the evolution procedure to converge fast...
Grigorios N. Beligiannis, Georgios A. Tsirogiannis...