Sciweavers

2625 search results - page 386 / 525
» Applications 2000
Sort
View
WAIFI
2010
Springer
192views Mathematics» more  WAIFI 2010»
15 years 9 months ago
Type-II Optimal Polynomial Bases
In the 1990s and early 2000s several papers investigated the relative merits of polynomial-basis and normal-basis computations for F2n . Even for particularly squaring-friendly app...
Daniel J. Bernstein, Tanja Lange
ISPAN
2002
IEEE
15 years 9 months ago
On the Impact of Naming Methods for Heap-Oriented Pointers in C Programs
Many applications written in C allocate memory blocks for their major data structures from the heap space at runtime. The analysis of heap-oriented pointers in such programs is cr...
Tong Chen, Jin Lin, Wei-Chung Hsu, Pen-Chung Yew
AGENTS
2001
Springer
15 years 9 months ago
A social reinforcement learning agent
We report on the use of reinforcement learning with Cobot, a software agent residing in the wellknown online community LambdaMOO. Our initial work on Cobot (Isbell et al.2000) pro...
Charles Lee Isbell Jr., Christian R. Shelton, Mich...
LCTRTS
2001
Springer
15 years 9 months ago
Combining Global Code and Data Compaction
Computers are increasingly being incorporated in devices with a limited amount of available memory. As a result research is increasingly focusing on the automated reduction of pro...
Bjorn De Sutter, Bruno De Bus, Koenraad De Bossche...
167
Voted
ACSAC
2000
IEEE
15 years 9 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik