Sciweavers

1151 search results - page 123 / 231
» Modelling Digital Circuits Problems with Set Constraints
Sort
View
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
15 years 4 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
AAAI
1992
14 years 11 months ago
Causal Approximations
models require the identi cation of abstractions and approximations that are well suited to the task at hand. In this paper we analyze the problem of automatically selecting adequ...
P. Pandurang Nayak
ECAL
2005
Springer
15 years 3 months ago
A Co-evolutionary Epidemiological Model for Artificial Life and Death
Abstract. This paper presents a model of the co-evolution of transmissible disease and a population of non-randomly mixed susceptible agents. The presence of the disease elements i...
Alan Dorin
DEBS
2008
ACM
14 years 11 months ago
Availability models for underlay aware overlay networks
Availability of an overlay network is a necessary condition for event delivery in event based systems. The availability of the overlay links depends on the underlying physical net...
Madhu Kumar SD, Umesh Bellur
PAMI
2012
13 years 10 days ago
Task-Driven Dictionary Learning
—Modeling data with linear combinations of a few elements from a learned dictionary has been the focus of much recent research in machine learning, neuroscience, and signal proce...
Julien Mairal, Francis Bach, Jean Ponce