Sciweavers

315 search results - page 35 / 63
» Claims Analysis
Sort
View
135
Voted
GECCO
2006
Springer
158views Optimization» more  GECCO 2006»
15 years 7 months ago
Properties of symmetric fitness functions
The properties of symmetric fitness functions are investigated. We show that a well-known encoding scheme inducing symmetric functions has the non-synonymous property and the sear...
Sung-Soon Choi, Yung-Keun Kwon, Byung Ro Moon
CCS
2008
ACM
15 years 6 months ago
On the protocol composition logic PCL
A recent development in formal security protocol analysis is the Protocol Composition Logic (PCL). We identify a number of problems with this logic as well as with extensions of t...
Cas J. F. Cremers
142
Voted
TSP
2012
13 years 11 months ago
Parametrization of Linear Systems Using Diffusion Kernels
—Modeling natural and artificial systems has played a key role in various applications and has long been a task that has drawn enormous efforts. In this work, instead of explori...
Ronen Talmon, Dan Kushnir, Ronald R. Coifman, Isra...
124
Voted
ISCA
2010
IEEE
405views Hardware» more  ISCA 2010»
15 years 9 months ago
Debunking the 100X GPU vs. CPU myth: an evaluation of throughput computing on CPU and GPU
Recent advances in computing have led to an explosion in the amount of data being generated. Processing the ever-growing data in a timely manner has made throughput computing an i...
Victor W. Lee, Changkyu Kim, Jatin Chhugani, Micha...
AAAI
1994
15 years 5 months ago
Situated Plan Attribution for Intelligent Tutoring
Plan recognition techniques frequently make rigid assumptions about the student's plans, and invest substantial effort to infer unobservable properties of the student. The pe...
Randall W. Hill Jr., W. Lewis Johnson