Sciweavers

1562 search results - page 90 / 313
» Convenience Over Correctness
Sort
View
IJCNN
2007
IEEE
14 years 3 months ago
Analyzing the Fuzzy ARTMAP Matchtracking mechanism with Co-Objective Optimization Theory
— In the process of learning a pattern I, the Fuzzy ARTMAP algorithm templates (i.e., the weight vectors corresponding to nodes of its category representation layer) compete for ...
José Castro, Michael Georgiopoulos, Jimmy S...
ISCAS
2007
IEEE
103views Hardware» more  ISCAS 2007»
14 years 3 months ago
Sliding-Window Digital Fountain Codes for Streaming of Multimedia Contents
— Digital fountain codes are becoming increasingly important for multimedia communications over networks subject to packet erasures. These codes have significantly lower complex...
Mattia C. O. Bogino, Pasquale Cataldi, Marco Grang...
P2P
2007
IEEE
132views Communications» more  P2P 2007»
14 years 3 months ago
The Design and Evaluation of Techniques for Route Diversity in Distributed Hash Tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly r...
Cyrus Harvesf, Douglas M. Blough
SEW
2003
IEEE
14 years 2 months ago
Instrumentation of Intermediate Code for Runtime Verification
Runtime monitoring is aimed at ensuring correct runtime behavior with respect to specified constraints. It provides assurance that properties are maintained during a given program...
Ann Q. Gates, Oscar Mondragon, Mary Payne, Steve R...
LICS
1999
IEEE
14 years 1 months ago
Proof Techniques for Cryptographic Processes
Contextual equivalences for cryptographic process calculi, like the spi-calculus, can be used to reason about correctness of protocols, but their definition suffers from quantific...
Michele Boreale, Rocco De Nicola, Rosario Pugliese