Sciweavers

612 search results - page 31 / 123
» Hardness assumptions in the foundations of theoretical compu...
Sort
View
ACMSE
2006
ACM
14 years 1 months ago
Some new approaches for preventing software tampering
In this paper, we propose several methods to increase the difficulty of reverse engineering applications, with special emphasis on preventing the circumvention of copy protection ...
Bin Fu, Golden G. Richard III, Yixin Chen
FOCS
1990
IEEE
13 years 11 months ago
On the Predictability of Coupled Automata: An Allegory about Chaos
We show a sharp dichotomy between systems of identical automata with a symmetric global control whose behavior is easy to predict, and those whose behavior is hard to predict. The...
Samuel R. Buss, Christos H. Papadimitriou, John N....
BIRTHDAY
2008
Springer
13 years 9 months ago
Why Sets?
Sets play a key role in foundations of mathematics. Why? To what extent is it an accident of history? Imagine that you have a chance to talk to mathematicians from a far-away plane...
Andreas Blass
MFCS
2010
Springer
13 years 6 months ago
Evaluating Non-square Sparse Bilinear Forms on Multiple Vector Pairs in the I/O-Model
We consider evaluating one bilinear form defined by a sparse Ny × Nx matrix A having h entries on w pairs of vectors The model of computation is the semiring I/O-model with main ...
Gero Greiner, Riko Jacob

Book
349views
15 years 3 months ago
Thinking in Java
"Much of the motivation and effort for this edition is to bring the book up to date with the Java JDK 1.4 release of the language. However, it has also become clear that most ...
Jolt Award