Sciweavers

221 search results - page 28 / 45
» Algebraic Stuttering Simulations
Sort
View
ACSAC
2003
IEEE
14 years 1 months ago
An IP Traceback Technique against Denial-of-Service Attacks
Reflector attack [9] belongs to one of the most serious types of Denial-of-Service (DoS) attacks, which can hardly be traced by contemporary traceback techniques, since the marked...
Zhaole Chen, Moon-Chuen Lee
INDOCRYPT
2003
Springer
14 years 28 days ago
Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria
We develop an improved cost function to be used in simulated annealing followed by hill-climbing to find Boolean functions satisfying multiple desirable criteria such as high nonli...
Selçuk Kavut, Melek D. Yücel
ITS
2010
Springer
178views Multimedia» more  ITS 2010»
14 years 16 days ago
Learning by Teaching SimStudent
The purpose of the current study was to test whether we could create a system where students can learn by teaching a live machine-learning agent. SimStudent is a computer agent tha...
Noboru Matsuda, Victoria Keiser, Rohan Raizada, Ga...
EUROMICRO
1999
IEEE
14 years 2 days ago
Software Synthesis for System Level Design Using Process Execution Trees
Software synthesis for system level design languages becomes feasible because the current technology, pricing and application trends will most likely alleviate the industrial empha...
Leo J. van Bokhoven, Jeroen Voeten, Marc Geilen
LISP
2006
105views more  LISP 2006»
13 years 7 months ago
Call-by-push-value: Decomposing call-by-value and call-by-name
We present the call-by-push-value (CBPV) calculus, which decomposes the typed call-by-value (CBV) and typed call-by-name (CBN) paradigms into fine-grain primitives. On the operatio...
Paul Blain Levy