Sciweavers

500 search results - page 83 / 100
» Quantum computing: beyond the limits of conventional computa...
Sort
View
CHES
1999
Springer
91views Cryptology» more  CHES 1999»
13 years 11 months ago
A High-Performance Flexible Architecture for Cryptography
Cryptographic algorithms are more efficiently implemented in custom hardware than in software running on general-purpose processors. However, systems which use hardware implementat...
R. Reed Taylor, Seth Copen Goldstein
ESEC
1997
Springer
13 years 11 months ago
Verification of Liveness Properties Using Compositional Reachability Analysis
The software architecture of a distributed program can be represented by a hierarchical composition of subsystems, with interacting processes at the leaves of the hierarchy. Compo...
Shing-Chi Cheung, Dimitra Giannakopoulou, Jeff Kra...
MICCAI
2000
Springer
13 years 11 months ago
Nonrigid Registration of 3D Scalar, Vector and Tensor Medical Data
New medical imaging modalities offering multi-valued data, such as phase contrast MRA and diffusion tensor MRI, require general representations for the development of automatized a...
Juan Ruiz-Alzola, Carl-Fredrik Westin, Simon K. Wa...
ICML
1994
IEEE
13 years 11 months ago
Learning Without State-Estimation in Partially Observable Markovian Decision Processes
Reinforcement learning (RL) algorithms provide a sound theoretical basis for building learning control architectures for embedded agents. Unfortunately all of the theory and much ...
Satinder P. Singh, Tommi Jaakkola, Michael I. Jord...
DAS
2010
Springer
13 years 11 months ago
Improved classification through runoff elections
We consider the problem of dealing with irrelevant votes when a multi-case classifier is built from an ensemble of binary classifiers. We show how run-off elections can be used to...
Oleg Golubitsky, Stephen M. Watt