Sciweavers

1818 search results - page 113 / 364
» Operant conditioning
Sort
View
LICS
2003
IEEE
14 years 2 months ago
An NP Decision Procedure for Protocol Insecurity with XOR
We provide a method for deciding the insecurity of cryptographic protocols in presence of the standard Dolev-Yao intruder (with a finite number of sessions) extended with so-call...
Yannick Chevalier, Ralf Küsters, Michaël...
ACIVS
2009
Springer
14 years 1 months ago
Engineering of Computer Vision Algorithms Using Evolutionary Algorithms
Abstract. Computer vision algorithms are currently developed by looking up the available operators from the literature and then arranging those operators such that the desired task...
Marc Ebner
DSN
2000
IEEE
14 years 1 months ago
Software-Implemented Fault Detection for High-Performance Space Applications
We describe and test a software approach to overcoming radiation-induced errors in spaceborne applications running on commercial off-the-shelf components. The approach uses checks...
Michael J. Turmon, Robert Granat, Daniel S. Katz
SRDS
2000
IEEE
14 years 1 months ago
Semantically Reliable Multicast Protocols
Reliable multicast protocols can strongly simplify the design of distributed applications. However, it is hard to sustain a high multicast throughput when groups are large and het...
José Orlando Pereira, Rui Carlos Oliveira, ...
HOTOS
1999
IEEE
14 years 1 months ago
The Case for Informed Transport Protocols
Wide-area distributed applications are frequently limited by the performance of Internet data transfer. We argue that the principle cause of this effect is the poor interaction be...
Stefan Savage, Neal Cardwell, Thomas E. Anderson