Sciweavers

419 search results - page 65 / 84
» Strategic Evaluation in Complex Domains
Sort
View
102
Voted
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
15 years 4 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
3DPVT
2004
IEEE
15 years 4 months ago
Robust Concealment for Erroneous Block Bursts in Stereoscopic Images
With the increasing number of image communication applications especially in the low complexity domain, error concealment has become a very important field of research. Since many...
Sebastian Knorr, Carsten Clemens, Matthias Kunter,...
126
Voted
ESOP
2006
Springer
15 years 4 months ago
Step-Indexed Syntactic Logical Relations for Recursive and Quantified Types
We present a sound and complete proof technique, based on syntactic logical relations, for showing contextual equivalence of expressions in a -calculus with recursive types and imp...
Amal J. Ahmed
EUROPAR
2006
Springer
15 years 4 months ago
Private Virtual Cluster: Infrastructure and Protocol for Instant Grids
Given current complexity of Grid technologies, the lack of security of P2P systems and the rigidity of VPN technologies make sharing resources belonging to different institutions s...
Ala Rezmerita, Tangui Morlier, Vincent Néri...
86
Voted
GECCO
2010
Springer
174views Optimization» more  GECCO 2010»
15 years 4 months ago
Real-coded genetic algorithm benchmarked on noiseless black-box optimization testbed
Genetic algorithms—a class of stochastic population-based optimization techniques—have been widely realized as the effective tools to solve complicated optimization problems ...
Thanh-Do Tran, Gang-Gyoo Jin