Sciweavers

1549 search results - page 254 / 310
» On the rules of intermediate logics
Sort
View
AIPS
2009
13 years 9 months ago
Suboptimal and Anytime Heuristic Search on Multi-Core Machines
In order to scale with modern processors, planning algorithms must become multi-threaded. In this paper, we present parallel shared-memory algorithms for two problems that underli...
Ethan Burns, Seth Lemons, Wheeler Ruml, Rong Zhou
ASIAN
2009
Springer
308views Algorithms» more  ASIAN 2009»
13 years 9 months ago
Automated Security Proof for Symmetric Encryption Modes
Abstract. We presents a compositional Hoare logic for proving semantic security of modes of operation for symmetric key block ciphers. We propose a simple programming language to s...
Martin Gagné, Pascal Lafourcade, Yassine La...
CEC
2008
IEEE
13 years 8 months ago
Design and implementation of a patterns recognition system for analysis of biological liquids
Given the great amount of data that are generated of the experiments to analyze information of extracted chemical fluids of the brain of a rodent, arises the necessity to design an...
Jose Aguilar, Luis Hernandez, Anny Olivar
DKE
2008
103views more  DKE 2008»
13 years 7 months ago
The XML Tree Model - toward an XML conceptual schema reversed from XML Schema Definition
XML Schema Definition (XSD) is the logical schemas of an XML model, but there is no standard format for the conceptual schema of an XML model. Therefore, we propose an XML Tree Mo...
Joseph Fong, San Kuen Cheung, Herbert Shiu
FUIN
2008
93views more  FUIN 2008»
13 years 7 months ago
Logic-based Conflict Detection for Distributed Policies
Policies are used to describe rules that are employed to modify (often distributed) system behaviour at runtime. Typically policies are created by many different people and there a...
Carlo Montangero, Stephan Reiff-Marganiec, Laura S...