Sciweavers

367 search results - page 33 / 74
» Using the Experimental Method to Produce Reliable Self-Organ...
Sort
View
DICTA
2007
14 years 11 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
PLDI
2009
ACM
15 years 4 months ago
Dynamic software updates: a VM-centric approach
Software evolves to fix bugs and add features. Stopping and restarting programs to apply changes is inconvenient and often costly. Dynamic software updating (DSU) addresses this ...
Suriya Subramanian, Michael W. Hicks, Kathryn S. M...
ICDE
2004
IEEE
140views Database» more  ICDE 2004»
15 years 11 months ago
Approximate Aggregation Techniques for Sensor Databases
In the emerging area of sensor-based systems, a significant challenge is to develop scalable, fault-tolerant methods to extract useful information from the data the sensors collec...
Jeffrey Considine, Feifei Li, George Kollios, John...
GECCO
2010
Springer
173views Optimization» more  GECCO 2010»
14 years 10 months ago
Superstate identification for state machines using search-based clustering
State machines are a popular method of representing a syshigh level of abstraction that enables developers to gain an overview of the system they represent and quickly understand ...
Mathew Hall, Phil McMinn, Neil Walkinshaw
ROBOCUP
2007
Springer
159views Robotics» more  ROBOCUP 2007»
15 years 3 months ago
High Accuracy Navigation in Unknown Environment Using Adaptive Control
Aiming to reduce cycle time and improving the accuracy on tracking, a modified adaptive control was developed, which adapts autonomously to changing dynamic parameters. The platfor...
Fernando Ribeiro, Ivo Moutinho, Nino Pereira, Fern...