Sciweavers

3775 search results - page 46 / 755
» The Expression Problem Revisited
Sort
View
101
Voted
GECCO
2007
Springer
177views Optimization» more  GECCO 2007»
15 years 7 months ago
Evolving virtual creatures revisited
Thirteen years have passed since Karl Sims published his work on evolving virtual creatures. Since then, several novel approaches to neural network evolution and genetic algorithm...
Peter Krcah
106
Voted
PEWASUN
2006
ACM
15 years 6 months ago
Revisiting neighbor discovery with interferences consideration
In wireless multi-hop networks, hello protocols for neighbor discovery are a basic service offered by the networking stack. However, their study usually rely on rather simplistic...
Elyes Ben Hamida, Guillaume Chelius, Eric Fleury
93
Voted
IPPS
2005
IEEE
15 years 6 months ago
FROST: Revisited and Distributed
FROST (Fold Recognition-Oriented Search Tool) [6] is a software whose purpose is to assign a 3D structure to a protein sequence. It is based on a series of filters and uses a dat...
Vincent Poirriez, Rumen Andonov, Antoine Marin, Je...
99
Voted
CCS
2005
ACM
15 years 6 months ago
Keyboard acoustic emanations revisited
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and t...
Li Zhuang, Feng Zhou, J. D. Tygar
PKC
2005
Springer
110views Cryptology» more  PKC 2005»
15 years 6 months ago
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited
To sign with RSA, one usually encodes the message m as µ(m) and then raises the result to the private exponent modulo N. In Asiacrypt 2000, Coron et al. showed how to build a secu...
Julien Cathalo, Jean-Sébastien Coron, David...