Sciweavers

17018 search results - page 3354 / 3404
» From the How to the What
Sort
View
JAR
2000
145views more  JAR 2000»
13 years 8 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
JCNS
2000
142views more  JCNS 2000»
13 years 8 months ago
A Temporal Mechanism for Generating the Phase Precession of Hippocampal Place Cells
The phase relationship between the activity of hippocampal place cells and the hippocampal theta rhythm systematically precesses as the animal runs through the region in an environ...
Amitabha Bose, Victoria Booth, Michael Recce
NJC
2000
169views more  NJC 2000»
13 years 8 months ago
A Type System for Bounded Space and Functional In-Place Update
We show how linear typing can be used to obtain functional programs which modify heap-allocated data structures in place. We present this both as a "design pattern" for ...
Martin Hofmann
RAS
2000
106views more  RAS 2000»
13 years 8 months ago
Robust localization of auditory and visual targets in a robotic barn owl
In the last two decades, the barn owl, a nocturnal predator with accurate visual and auditory capabilities, has become a common experimental system for neuroscientists investigati...
Michele Rucci, Jonathan Wray, Gerald M. Edelman
SCP
2000
119views more  SCP 2000»
13 years 8 months ago
Automated compositional Markov chain generation for a plain-old telephone system
Obtaining performance models, like Markov chains and queueing networks, for systems of significant complexity and magnitude is a difficult task that is usually tackled using human...
Holger Hermanns, Joost-Pieter Katoen
« Prev « First page 3354 / 3404 Last » Next »