Sciweavers

2913 search results - page 84 / 583
» How Much to Copy
Sort
View
IH
1998
Springer
14 years 2 months ago
Information Hiding to Foil the Casual Counterfeiter
Abstract. Security documents (currency, treasury bills, stocks, bonds, birth certificates, etc.) provide an interesting problem space for investigating information hiding. Recent a...
Daniel Gruhl, Walter Bender
PLDI
1996
ACM
14 years 2 months ago
Representing Control in the Presence of One-Shot Continuations
Traditional first-class continuation mechanisms allow a captured continuation to be invoked multiple times. Many continuations, however, are invoked only once. This paper introduc...
Carl Bruggeman, Oscar Waddell, R. Kent Dybvig
CACM
2006
192views more  CACM 2006»
13 years 10 months ago
Live forensics: diagnosing your system without killing it first
: Traditional methods of digital forensics analyze a static disk image--a bitstream copy of a disk created while the system is offline. Recent trends--including greatly increased d...
Frank Adelstein
AROBOTS
2011
13 years 5 months ago
Setpoint regulation for stochastically interacting robots
— We present an integral feedback controller that regulates the average copy number of a particular assembly in a system of stochastically interacting robots. The mathematical mo...
Nils Napp, Samuel Burden, Eric Klavins
FLAIRS
2004
13 years 11 months ago
Being as Informative as the User Wants: The Generation of Information Enriched Utterances
The work in this paper is based on the claim that collaborative dialogue involves taking into account how much information an utterance conveys, in the sense that it thereby shows...
Stina Ericsson