Sciweavers

6562 search results - page 130 / 1313
» Noetherianity and Combination Problems
Sort
View
NDSS
1999
IEEE
15 years 9 months ago
Addressing the Problem of Undetected Signature Key Compromise
Suppose that messages have been signed using a user's signature private key during the period of time after a key compromise but before the compromise is detected. This is a ...
Mike Just, Paul C. van Oorschot
CPE
1998
Springer
80views Hardware» more  CPE 1998»
15 years 9 months ago
Probability, Parallelism and the State Space Exploration Problem
We present a new dynamic probabilistic state exploration algorithm based on hash compaction. Our method has a low state omission probability and low memory usage that is independen...
William J. Knottenbelt, Mark Mestern, Peter G. Har...
EURODAC
1995
IEEE
133views VHDL» more  EURODAC 1995»
15 years 8 months ago
Tree restructuring approach to mapping problem in cellular-architecture FPGAs
A new technique for mapping combinational circuits to Fine-Grain Cellular-Architecture FPGAs is presented. The proposed tree restructuring algorithm preserves local connectivity a...
Naveen Ramineni, Malgorzata Chrzanowska-Jeske, Nav...
ATAL
2008
Springer
15 years 6 months ago
Theoretical and experimental results on the goal-plan tree problem
Agents programmed in BDI-inspired languages have goals to achieve and a library of plans that can be used to achieve them, typically requiring further goals to be adopted. This is...
Patricia H. Shaw, Berndt Farwer, Rafael H. Bordini
FLAIRS
2003
15 years 6 months ago
The Rule Retranslation Problem and the Validation Interface
Current rule base maintenance is wasting refinement and inference performance. There are only few maintenance concepts, which enjoy both (1) formal rule refinement and (2) utili...
Hans-Werner Kelbassa, Rainer Knauf