Sciweavers

13977 search results - page 194 / 2796
» Evolution in complex systems
Sort
View
158
Voted
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
15 years 10 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
ATAL
2007
Springer
15 years 10 months ago
Batch reinforcement learning in a complex domain
Temporal difference reinforcement learning algorithms are perfectly suited to autonomous agents because they learn directly from an agent’s experience based on sequential actio...
Shivaram Kalyanakrishnan, Peter Stone
CANS
2007
Springer
154views Cryptology» more  CANS 2007»
15 years 10 months ago
Forward-Secure Key Evolution in Wireless Sensor Networks
We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a syste...
Marek Klonowski, Miroslaw Kutylowski, Michal Ren, ...
SEMWEB
2007
Springer
15 years 10 months ago
Dynamic Ontology Co-Evolution from Texts: Principles and Case Study
As claimed in the Semantic Web project, a huge amount of physically distributed interacting software agents could find the semantic of available resources and answer more relevantl...
Kévin Ottens, Nathalie Aussenac-Gilles, Mar...
OOPSLA
2001
Springer
15 years 8 months ago
Multitasking without Compromise: A Virtual Machine Evolution
The Multitasking Virtual Machine (called from now on simply MVM) is a modification of the Java™ virtual machine. It enables safe, secure, and scalable multitasking. Safety is ac...
Grzegorz Czajkowski, Laurent Daynès