Sciweavers

2432 search results - page 450 / 487
» Cryptographic logical relations
Sort
View
IGPL
2010
117views more  IGPL 2010»
15 years 1 months ago
Executable specification of open multi-agent systems
Multi-agent systems where the agents are developed by parties with competing interests, and where there is no access to an agent's internal state, are often classified as `ope...
Alexander Artikis, Marek J. Sergot
CVPR
2011
IEEE
15 years 6 days ago
Enforcing Similarity Constraints with Integer Programming for Better Scene Text Recognition
The recognition of text in everyday scenes is made difficult by viewing conditions, unusual fonts, and lack of linguistic context. Most methods integrate a priori appearance info...
David Smith, Jacqueline Feild, Eric Learned-Miller
CORR
2011
Springer
259views Education» more  CORR 2011»
14 years 11 months ago
Automatic Optimization for MapReduce Programs
The MapReduce distributed programming framework has become popular, despite evidence that current implementations are inefficient, requiring far more hardware than a traditional r...
Eaman Jahani, Michael J. Cafarella, Christopher R&...
IJNSEC
2011
167views more  IJNSEC 2011»
14 years 11 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
SYNTHESE
2011
77views more  SYNTHESE 2011»
14 years 11 months ago
E. W. Beth as a philosopher of physics
This paper examines E. W. Beth’s work in the philosophy of physics, both from a historical and a systematic point of view. Beth saw the philosophy of physics first of all as an ...
Dennis Dieks