Sciweavers

1116 search results - page 154 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
DSL
2009
13 years 5 months ago
LEESA: Embedding Strategic and XPath-Like Object Structure Traversals in C++
Traversals of heterogeneous object structures are the most common operations in schema-first applications where the three key issues are (1) separation of traversal specifications ...
Sumant Tambe, Aniruddha S. Gokhale
ESOP
2010
Springer
14 years 2 months ago
Amortized Resource Analysis with Polynomial Potential
In 2003, Hofmann and Jost introduced a type system that uses a potential-based amortized analysis to infer bounds on the resource consumption of (first-order) functional programs....
Jan Hoffmann 0002, Martin Hofmann
ICANN
2009
Springer
14 years 2 months ago
Measuring and Optimizing Behavioral Complexity for Evolutionary Reinforcement Learning
Model complexity is key concern to any artificial learning system due its critical impact on generalization. However, EC research has only focused phenotype structural complexity ...
Faustino J. Gomez, Julian Togelius, Jürgen Sc...
ICSR
2009
Springer
14 years 2 months ago
Introducing Motivations in Design Pattern Representation
Abstract. Design pattern formalization is aimed at encouraging the use of design patterns during the design phase. Many approaches focuses on providing solutions with a graphical n...
Luca Sabatucci, Massimo Cossentino, Angelo Susi
AUIC
2006
IEEE
14 years 1 months ago
Generating mobile device user interfaces for diagram-based modelling tools
Mobile display devices such as phones and PDAs have become very widely available and used. However, most content on these devices is limited to text, static images and motion vide...
Dejin Zhao, John C. Grundy, John G. Hosking