Sciweavers

1018 search results - page 75 / 204
» Generative unbinding of names
Sort
View
JUCS
2008
160views more  JUCS 2008»
13 years 9 months ago
Automatic Construction of Fuzzy Rule Bases: a further Investigation into two Alternative Inductive Approaches
: The definition of the Fuzzy Rule Base is one of the most important and difficult tasks when designing Fuzzy Systems. This paper discusses the results of two different hybrid meth...
Marcos Evandro Cintra, Heloisa de Arruda Camargo, ...
TCS
2008
13 years 9 months ago
Computational self-assembly
The object of this paper is to appreciate the computational limits inherent in the combinatorics of an applied concurrent (aka agent-based) language . That language is primarily m...
Pierre-Louis Curien, Vincent Danos, Jean Krivine, ...
ICFP
2002
ACM
14 years 9 months ago
Compiling scheme to JVM bytecode: : a performance study
We have added a Java virtual machine (henceforth JVM) bytecode generator to the optimizing Scheme-to-C compiler Bigloo. We named this new compiler BiglooJVM. We have used this new...
Bernard P. Serpette, Manuel Serrano
CEC
2008
IEEE
14 years 3 months ago
Evolutionary optimization of a bipedal gait in a physical robot
— Evolutionary optimization of a gait for a bipedal robot has been studied, combining structural and parametric modifications of the system responsible for generating the gait. ...
Krister Wolff, David Sandberg, Mattias Wahde
TCC
2005
Springer
139views Cryptology» more  TCC 2005»
14 years 2 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen