Sciweavers

3228 search results - page 86 / 646
» Computationally Sound Proofs
Sort
View
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
14 years 3 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...
HCI
2009
13 years 6 months ago
Study of Feature Values for Subjective Classification of Music
: In this research, we analyze how the sound and music relate to humans from the aspect of Kansei engineering. We analyze what features of the sound humans pay attention and how hu...
Masashi Murakami, Toshikazu Kato

Book
391views
15 years 7 months ago
Build a Computer from Scratch
"In this article series you will be shown how to build a computer system. This article series will cover how to select and install everything such as the case, motherboard, vi...
Jeff Heaton
EVOW
2007
Springer
14 years 23 days ago
An Evolutionary Approach to Computer-Aided Orchestration
In this paper we introduce an hybrid evolutionary algorithm for computer-aided orchestration. Our current approach to orchestration consists in replicating a target sound with a se...
Grégoire Carpentier, Damien Tardieu, G&eacu...
CP
2009
Springer
14 years 3 months ago
Why Cumulative Decomposition Is Not as Bad as It Sounds
Abstract. The global cumulative constraint was proposed for modelling cumulative resources in scheduling problems for finite domain (FD) propagation. Since that time a great deal ...
Andreas Schutt, Thibaut Feydy, Peter J. Stuckey, M...