Sciweavers

1729 search results - page 287 / 346
» Generic Haskell: Applications
Sort
View
AFRICACRYPT
2008
Springer
13 years 11 months ago
How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?
Abstract. In the context of iterated hash functions, "dithering" designates the technique of adding an iteration-dependent input to the compression function in order to d...
Jean-Philippe Aumasson, Raphael C.-W. Phan
ASM
2008
ASM
13 years 11 months ago
Using EventB to Create a Virtual Machine Instruction Set Architecture
A Virtual Machine (VM) is a program running on a conventional microprocessor that emulates the binary instruction set, registers, and memory space of an idealized computing machine...
Stephen Wright
ATAL
2008
Springer
13 years 11 months ago
SmartBody: behavior realization for embodied conversational agents
Researchers demand much from their embodied conversational agents (ECAs), requiring them to be both life-like, as well as responsive to events in an interactive setting. We find t...
Marcus Thiébaux, Stacy Marsella, Andrew N. ...
AUTONOMICS
2008
ACM
13 years 11 months ago
Autonomic management via dynamic combinations of reusable strategies
Autonomic Management capabilities become increasingly important for attaining functional and quality goals in software systems. Nonetheless, successful Autonomic Management soluti...
Ada Diaconescu, Yoann Maurel, Philippe Lalanda
AUTONOMICS
2008
ACM
13 years 11 months ago
Emergent engineering for the management of complex situations
Ubiquitous computing and communication environments connect systems and people in unprecedented ways, but also fundamentally challenge the mindset of traditional systems engineeri...
René Doursat, Mihaela Ulieru