Sciweavers

490 search results - page 66 / 98
» Equivalent Keys of HPC
Sort
View
TACS
1994
Springer
14 years 23 days ago
ML Typing, Explicit Polymorphism and Qualified Types
The ML type system was originally introduced as a means of identifying a class of terms in a simple untyped language, often referred to as core-ML, whose evaluation could be guaran...
Mark P. Jones
CISSE
2007
Springer
14 years 19 days ago
Issues in Simulation for Valuing Long-Term Forwards
Abstract- This paper explores valuing long-term equity forwardcontracts or futures where both the underlying volatility and the interest rates are modeled as stochastic random vari...
Phillip G. Bradford, Alina Olteanu
ESA
2007
Springer
105views Algorithms» more  ESA 2007»
14 years 18 days ago
Finding Mobile Data: Efficiency vs. Location Inaccuracy
A token is hidden in one out of n boxes following some known probability distribution and then all the boxes are locked. The goal of a searcher is to find the token in at most D n...
Amotz Bar-Noy, Joanna Klukowska
ACNS
2006
Springer
241views Cryptology» more  ACNS 2006»
14 years 13 days ago
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive
In this paper we combine the error correction and encryption functionality into one block cipher, which we call High Diffusion (HD) cipher. The error correcting property of this ci...
Chetan Nanjunda Mathur, Karthik Narayan, K. P. Sub...
CASES
2004
ACM
14 years 13 days ago
Translating affine nested-loop programs to process networks
New heterogeneous multiprocessor platforms are emerging that are typically composed of loosely coupled components that exchange data using programmable interconnections. The compon...
Alexandru Turjan, Bart Kienhuis, Ed F. Deprettere