Sciweavers

3374 search results - page 214 / 675
» Explaining Similarity of Terms
Sort
View
ACMSE
2000
ACM
15 years 9 months ago
Exploring an information-based approach to computation and computational complexity
We present the background and justi cation for a new approachto studying computation and computational complexity. We focus on categories of problems and categories of solutions w...
D. E. Stevenson
SIGMOD
1999
ACM
94views Database» more  SIGMOD 1999»
15 years 8 months ago
Logical Logging to Extend Recovery to New Domains
Recovery can be extended to new domains at reduced logging cost by exploiting "logical" log operations. During recovery, a logical log operation may read data values fro...
David B. Lomet, Mark R. Tuttle
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 8 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
SIGGRAPH
1994
ACM
15 years 8 months ago
Drawing and animation using skeletal strokes
strokes makes it particularly attractive in terms of storage size and transmission efficiency. Its efficient implementation is favourable for incorporation into windowing systems a...
Siu Chi Hsu, Irene H. H. Lee
CEC
2007
IEEE
15 years 8 months ago
A versatile quantum-inspired evolutionary algorithm
Abstract-- This study points out some weaknesses of existing Quantum-Inspired Evolutionary Algorithms (QEA) and explains in particular how hitchhiking phenomenons can slow down the...
Michael Defoin-Platel, Stefan Schliebs, Nikola Kas...