Sciweavers

438 search results - page 45 / 88
» The forest hiding problem
Sort
View
ACSAC
2006
IEEE
15 years 3 months ago
CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage Protection
Several secure computing hardware architectures using memory encryption and memory integrity checkers have been proposed during the past few years to provide applications with a t...
Guillaume Duc, Ronan Keryell
WONTO
2008
15 years 1 months ago
ModOnto: A Tool for Modularizing Ontologies
During the last three years there has been growing interest and consequently active research on ontology modularization. This paper presents a concrete tool that incorporates an ap...
Camila Bezerra, Frederico Luiz Gonçalves de...
AAAI
1994
15 years 1 months ago
Evolving Neural Networks to Focus Minimax Search
Neural networks were evolved through genetic algorithms to focus minimax search in the game of Othello. At each level of the search tree, the focus networks decide which moves are...
David E. Moriarty, Risto Miikkulainen
AAAI
1990
15 years 1 months ago
Tree Decomposition with Applications to Constraint Processing
This paper concerns the task of removing redundant information from a given knowledge base, and restructuring it in the form of a tree, so as to admit efficient problem solving ro...
Itay Meiri, Judea Pearl, Rina Dechter
INFOCOM
2010
IEEE
14 years 10 months ago
Towards a Theory of Anonymous Networking
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination...
Javad Ghaderi, Rayadurgam Srikant