Sciweavers

2006 search results - page 102 / 402
» Heuristic Security-Testing Methods
Sort
View
ASPDAC
2000
ACM
102views Hardware» more  ASPDAC 2000»
15 years 4 months ago
Multi-clock path analysis using propositional satisfiability
We present a satisfiability based multi-clock path analysis method. The method uses propositional satisfiability (SAT) in the detection of multi-clock paths. We show a method to re...
Kazuhiro Nakamura, Shinji Maruoka, Shinji Kimura, ...
93
Voted
IEAAIE
2001
Springer
15 years 5 months ago
On the Relationship between Learning Capability and the Boltzmann-Formula
In this paper a combined use of reinforcement learning and simulated annealing is treated. Most of the simulated annealing methods suggest using heuristic temperature bounds as the...
Péter Stefán, Laszlo Monostori
71
Voted
CG
2004
Springer
15 years 4 months ago
An Improved Safety Solver for Computer Go
Most Go-playing programs use a combination of search and heuristics based on an influence function to determine whether territories are safe. However, to assure the correct evaluat...
Xiaozhen Niu, Martin Müller 0003
IJNSEC
2006
131views more  IJNSEC 2006»
15 years 20 days ago
A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz
The most efficient technique for protecting the using Frobenius algorithms for scalar multiplication on Koblitz curves against the Side Channel Attacks seems to be the multiplier ...
Mustapha Hedabou
EOR
2007
163views more  EOR 2007»
15 years 19 days ago
The multi-depot vehicle routing problem with inter-depot routes
This article addresses an extension of the multi-depot vehicle routing problem in which vehicles may be replenished at intermediate depots along their route. It proposes a heurist...
Benoit Crevier, Jean-François Cordeau, Gilb...