Sciweavers

1270 search results - page 182 / 254
» IF Validation Environment Tutorial
Sort
View
ATAL
2005
Springer
15 years 10 months ago
Automatic computer game balancing: a reinforcement learning approach
Designing agents whose behavior challenges human players adequately is a key issue in computer games development. This work presents a novel technique, based on reinforcement lear...
Gustavo Andrade, Geber Ramalho, Hugo Santana, Vinc...
FPL
2005
Springer
131views Hardware» more  FPL 2005»
15 years 10 months ago
An Efficient Approach to Hide the Run-Time Reconfiguration from SW Applications
Dynamically reconfigurable logic is becoming an important design unit in SoC system. A method to make the reconfiguration management transparent to software applications is requir...
Yang Qu, Juha-Pekka Soininen, Jari Nurmi
HPCC
2005
Springer
15 years 10 months ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore
ICIAR
2005
Springer
15 years 10 months ago
Text-Pose Estimation in 3D Using Edge-Direction Distributions
Abstract. This paper presents a method for estimating the orientation of planar text surfaces using the edge-direction distribution (EDD) extracted from the image as input to a neu...
Marius Bulacu, Lambert Schomaker
ICICS
2005
Springer
15 years 10 months ago
Secure Multicast Using Proxy Encryption
In a secure multicast communication environment, only valid members belong to the multicast group could decrypt the data. In many previous researches, there is one “group key” ...
Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang