Sciweavers

2429 search results - page 331 / 486
» Using Aspects to Design a Secure System
Sort
View
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 2 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
SIGIR
2008
ACM
14 years 10 months ago
Personalized active learning for collaborative filtering
Collaborative Filtering (CF) requires user-rated training examples for statistical inference about the preferences of new users. Active learning strategies identify the most infor...
Abhay Harpale, Yiming Yang
NN
2000
Springer
137views Neural Networks» more  NN 2000»
14 years 10 months ago
Evolutionary robots with on-line self-organization and behavioral fitness
We address two issues in Evolutionary Robotics, namely the genetic encoding and the performance criterion, also known as fitness function. For the first aspect, we suggest to enco...
Dario Floreano, Joseba Urzelai
SCP
2002
112views more  SCP 2002»
14 years 9 months ago
Formal agent-oriented modeling with UML and graph transformation
The agent paradigm can be seen as an extension of the notion of (active) objects by concepts like autonomy and cooperation. Mainstream object-oriented modeling techniques do not a...
Ralph Depke, Reiko Heckel, Jochen Malte Küste...
ISCA
2011
IEEE
240views Hardware» more  ISCA 2011»
14 years 1 months ago
Virtualizing performance asymmetric multi-core systems
Performance-asymmetric multi-cores consist of heterogeneous cores, which support the same ISA, but have different computing capabilities. To maximize the throughput of asymmetric...
Youngjin Kwon, Changdae Kim, Seungryoul Maeng, Jae...