Sciweavers

563 search results - page 43 / 113
» A Typing Scheme for Behavioural Models
Sort
View
IJACT
2008
83views more  IJACT 2008»
13 years 8 months ago
On the relation among various security models for certificateless cryptography
: Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and se...
Qiong Huang, Duncan S. Wong
TASLP
2010
99views more  TASLP 2010»
13 years 7 months ago
A Virtual Model of Spring Reverberation
—The digital emulation of analog audio effects and synthesis components, through the simulation of lumped circuit components has seen a large amount of activity in recent years; ...
Stefan Bilbao, Julian Parker
EUROGP
2007
Springer
145views Optimization» more  EUROGP 2007»
14 years 17 days ago
GP Classifier Problem Decomposition Using First-Price and Second-Price Auctions
This work details an auction-based model for problem decomposition in Genetic Programming classification. The approach builds on the population-based methodology of Genetic Progra...
Peter Lichodzijewski, Malcolm I. Heywood
CLIMA
2007
13 years 10 months ago
Actions with Failures in Interval Temporal Logic
Abstract. Failures are unavoidable in many circumstances. For example, an agent may fail at some point to perform a task in a dynamic environment. Robust systems typically have mec...
Arjen Hommersom, Peter J. F. Lucas
SIAMDM
2010
114views more  SIAMDM 2010»
13 years 7 months ago
Rank-Based Attachment Leads to Power Law Graphs
Abstract. We investigate the degree distribution resulting from graph generation models based on rank-based attachment. In rank-based attachment, all vertices are ranked according ...
Jeannette Janssen, Pawel Pralat