Sciweavers

2261 search results - page 76 / 453
» Dynamic types for authentication
Sort
View
NECO
1998
171views more  NECO 1998»
13 years 8 months ago
Constrained Optimization for Neural Map Formation: A Unifying Framework for Weight Growth and Normalization
three different levels of abstraction: detailed models including ctivity dynamics, weight dynamics that abstract from the neural activity dynamics by an adiabatic approximation, an...
Laurenz Wiskott, Terrence J. Sejnowski
WISTP
2009
Springer
14 years 3 months ago
Algebraic Attacks on RFID Protocols
Abstract. This work aims to identify the algebraic problems which enable many attacks on RFID protocols. Toward this goal, three emerging types of attacks on RFID protocols, concer...
Ton van Deursen, Sasa Radomirovic
CISIM
2007
IEEE
14 years 3 months ago
The Compact Three Stages Method of the Signature Recognition
In this paper the off–line type signature analyses have been considered. Signature image by means of three different approaches is analysed, what allows to define features (weigh...
Piotr Porwik
TYPES
1995
Springer
14 years 13 days ago
A Natural Deduction Approach to Dynamic Logic
Natural Deduction style presentations of program logics are useful in view of the implementation of such logics in interactive proof development environments, based on type theory,...
Furio Honsell, Marino Miculan
FPL
2007
Springer
120views Hardware» more  FPL 2007»
14 years 3 months ago
Design Methodology and Trade-offs Analysis for Parameterized Dynamically Reconfigurable Processor Arrays
In this paper, we propose a Dynamically Reconfigurable Processor Array (DRPA) generator which can generate various types of DRPAs. Our target DRPA architecture is fully parameter...
Yohei Hasegawa, Hideharu Amano