Sciweavers

323 search results - page 34 / 65
» Verify Your Runs
Sort
View
PRL
2007
200views more  PRL 2007»
14 years 11 months ago
Generative learning of visual concepts using multiobjective genetic programming
This paper introduces a novel method of visual learning based on Genetic Programming, which evolves a population of individuals (image analysis programs) that process attributed v...
Krzysztof Krawiec
RTS
2008
131views more  RTS 2008»
14 years 11 months ago
Formal verification of multitasking applications based on timed automata model
The aim of this paper is to show, how a multitasking application running under a real-time operating system compliant with an OSEK/VDX standard can be modeled by timed automata. Th...
Libor Waszniowski, Zdenek Hanzálek
ICUMT
2009
14 years 9 months ago
A syntactic approach for identifying multi-protocol attacks
In the context of multiple security protocols running in the same environment, we propose a syntactical approach for identifying multi-protocol attacks. The proposed approach uses ...
Béla Genge, Piroska Haller
PET
2009
Springer
15 years 6 months ago
Privacy-Preserving Face Recognition
Abstract. Face recognition is increasingly deployed as a means to unobtrusively verify the identity of people. The widespread use of biometrics raises important privacy concerns, i...
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stef...
CEC
2008
IEEE
15 years 6 months ago
On the generality of the evolved driving rules of an agent operating a model of a car
—We present an approach for automated evolutionary design of the functionary of driving agent, able to operate a software model of fast running car. The objective of our work is ...
Hirotaka Yamazaki, Ivan Tanev, Tomoyuki Hiroyasu, ...