Sciweavers

671 search results - page 89 / 135
» On Observing and Constraining Active Systems
Sort
View
123
Voted
DFT
2008
IEEE
182views VLSI» more  DFT 2008»
15 years 2 months ago
Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis
This paper addresses a new threat to the security of integrated circuits (ICs). The migration of IC fabrication to untrusted foundries has made ICs vulnerable to malicious alterat...
Xiaoxiao Wang, Hassan Salmani, Mohammad Tehranipoo...
101
Voted
ICWS
2010
IEEE
15 years 2 months ago
Analyzing the Relationships between some Parameters of Web Services Reputation
In this paper, we provide an analysis of the impacts of some reputation parameters that an agent-based Web service holds while being active in the environment. To this end, we depl...
Babak Khosravifar, Jamal Bentahar, Ahmad Moazin
76
Voted
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
15 years 1 months ago
On hopeful monsters, neutral networks and junk code in evolving L-systems
This paper investigates L-system evolution through experiments with a simulation platform of virtual plants. The conducted simulations vary the occurrence probability of terminal ...
Stefan Bornhofen, Claude Lattaud
102
Voted
CONSTRAINTS
2008
89views more  CONSTRAINTS 2008»
15 years 23 days ago
A Reinforcement Learning Approach to Interval Constraint Propagation
When solving systems of nonlinear equations with interval constraint methods, it has often been observed that many calls to contracting operators do not participate actively to th...
Frédéric Goualard, Christophe Jerman...
109
Voted
PE
2002
Springer
111views Optimization» more  PE 2002»
15 years 10 days ago
Forwarders vs. centralized server: an evaluation of two approaches for locating mobile agents
This paper evaluates and compares the performance of two approaches for locating an agent in a mobile agent environment. The first approach dynamically creates a chain of forwarde...
Sara Alouf, Fabrice Huet, Philippe Nain