Sciweavers

1376 search results - page 213 / 276
» Searching Trees: An Essay
Sort
View
PKC
2009
Springer
142views Cryptology» more  PKC 2009»
16 years 12 days ago
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
This paper describes new methods in pairing-based signature schemes for identifying the invalid digital signatures in a batch, after batch verification has failed. These methods ef...
Brian J. Matt
ICSE
2008
IEEE-ACM
15 years 12 months ago
Formal concept analysis applied to fault localization
One time-consuming task in the development of software is debugging. Recent work in fault localization crosschecks traces of correct and failing execution traces, it implicitly se...
Peggy Cellier
EVOW
2009
Springer
15 years 6 months ago
Evolving Approximate Image Filters
Image filtering involves taking a digital image and producing a new image from it. In software packages such as Adobe’s Photoshop, image filters are used to produce artistic ve...
Simon Colton, Pedro Torres
ICVS
2009
Springer
15 years 6 months ago
Visual Registration Method for a Low Cost Robot
Abstract— An autonomous mobile robot must face the correspondence or data association problem in order to carry out tasks like place recognition or unknown environment mapping. I...
David Aldavert, Arnau Ramisa, Ricardo Toledo, Ramo...
PKDD
2009
Springer
107views Data Mining» more  PKDD 2009»
15 years 6 months ago
Neural Networks for State Evaluation in General Game Playing
Unlike traditional game playing, General Game Playing is concerned with agents capable of playing classes of games. Given the rules of an unknown game, the agent is supposed to pla...
Daniel Michulke, Michael Thielscher