Sciweavers

8695 search results - page 1301 / 1739
» Making the Complex Simple
Sort
View
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
15 years 8 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
CAV
2010
Springer
206views Hardware» more  CAV 2010»
15 years 8 months ago
Dynamic Cutoff Detection in Parameterized Concurrent Programs
We consider the class of finite-state programs executed by an unbounded number of replicated threads communicating via shared variables. The thread-state reachability problem for t...
Alexander Kaiser, Daniel Kroening, Thomas Wahl
CAE
2007
15 years 7 months ago
memory [en]code - Building a Collective Memory within a Tabletop Installation
In this paper, we introduce memory [en]code, a project that evolved through an art+science collaboration. memory [en]code is an interactive tabletop installation that visualizes d...
Holly Schmidt, Uta Hinrichs, Alan Dunning, M. Shee...
VISSYM
2007
15 years 7 months ago
Dimensional Congruence for Interactive Visual Data Mining and Knowledge Discovery
Many authors in the field of 3D human computer interaction have described the advantages of 3D user interfaces: Intuitive metaphors from daily life, immersive workspaces, virtual ...
Sebastian Baumgärtner, Achim Ebert, Matthias ...
143
Voted
AAAI
2007
15 years 7 months ago
Acquiring Visibly Intelligent Behavior with Example-Guided Neuroevolution
Much of artificial intelligence research is focused on devising optimal solutions for challenging and well-defined but highly constrained problems. However, as we begin creating...
Bobby D. Bryant, Risto Miikkulainen
« Prev « First page 1301 / 1739 Last » Next »