Sciweavers

1087 search results - page 123 / 218
» Generation under Space Constraints
Sort
View
FSE
2001
Springer
116views Cryptology» more  FSE 2001»
15 years 5 months ago
NESSIE: A European Approach to Evaluate Cryptographic Algorithms
The NESSIE project (New European Schemes for Signature, Integrity and Encryption) intends to put forward a portfolio containing the next generation of cryptographic primitives. The...
Bart Preneel
91
Voted
HICSS
1999
IEEE
93views Biometrics» more  HICSS 1999»
15 years 5 months ago
The Design of a Letter-Mail Transportation Network by Intelligent Techniques
Many transportation providers such as package delivery companies and postal service organizations face the problem of designing a transportation network in order to service their ...
Hans-Jürgen Sebastian, Tore Grünert, Mic...
79
Voted
ESANN
2008
15 years 2 months ago
Safe exploration for reinforcement learning
In this paper we define and address the problem of safe exploration in the context of reinforcement learning. Our notion of safety is concerned with states or transitions that can ...
Alexander Hans, Daniel Schneegaß, Anton Maxi...
APVIS
2004
15 years 2 months ago
Skeletal Animation for the Exploration of Graphs
The topic of skeletal animation and its associated techniques have previously been applied in the area of animating computer-generated characters for motion pictures and computer ...
Damian Merrick, Tim Dwyer
93
Voted
AAAI
2000
15 years 2 months ago
Applying Learnable Evolution Model to Heat Exchanger Design
A new approach to evolutionary computation, called Learnable Evolution Model (LEM), has been applied to the problem of optimizing tube structures of heat exchangers. In contrast t...
Kenneth A. Kaufman, Ryszard S. Michalski