Sciweavers

1439 search results - page 169 / 288
» Bagging with Adaptive Costs
Sort
View
TYPES
2004
Springer
14 years 2 months ago
A Machine-Checked Formalization of the Random Oracle Model
Abstract. Most approaches to the formal analysis of cryptography protocols make the perfect cryptographic assumption, which entails for example that there is no way to obtain knowl...
Gilles Barthe, Sabrina Tarento
ICNP
2003
IEEE
14 years 2 months ago
Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays
Structured peer-to-peer overlays provide a natural infrastructure for resilient routing via efficient fault detection and precomputation of backup paths. These overlays can respo...
Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony...
HICSS
2002
IEEE
150views Biometrics» more  HICSS 2002»
14 years 2 months ago
AUI: A Programming Language for Developing Plastic Interactive Software
With the proliferation of consumer computing devices with varied display and input characteristics, it has become desirable to develop interactive systems that are usable across m...
Kevin A. Schneider, James R. Cordy
TABLEAUX
2009
Springer
14 years 1 months ago
Tableaux for Projection Computation and Knowledge Compilation
Projection computation is a generalization of second-order quantifier elimination, which in turn is closely related to the computation of forgetting and of uniform interpolants. O...
Christoph Wernhard
APAQS
2000
IEEE
14 years 1 months ago
Object Oriented Design Function Points
Estimating different characteristics viz., size, cost, etc. of sofrware during different phases of software development is required to manage the resources effectively. Function p...
D. Janaki Ram, S. V. G. K. Raju