Sciweavers

1280 search results - page 68 / 256
» Soft Typing with Conditional Types
Sort
View
ASIACRYPT
1992
Springer
14 years 1 months ago
Nonperfect Secret Sharing Schemes
: Nonperfect secret sharing schemes NSSs have an advantage such that the size of shares can be shorter than that of perfect secret sharing schemes. This paper shows some basic prop...
Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii
HOTOS
2007
IEEE
14 years 1 months ago
Beyond Bug-Finding: Sound Program Analysis for Linux
It is time for us to focus on sound analyses for our critical systems software--that is, we must focus on analyses that ensure the absence of defects of particular known types, ra...
Zachary R. Anderson, Eric A. Brewer, Jeremy Condit...
CIE
2005
Springer
13 years 11 months ago
Domain-Theoretic Formulation of Linear Boundary Value Problems
Abstract. We present a domain theoretic framework for obtaining exact solutions of linear boundary value problems. Based on the domain of compact real intervals, we show how to app...
Dirk Pattinson
RIAO
2004
13 years 10 months ago
Subject Knowledge, Thesaurus-assisted Query Expansion and Search Success
This study explored how experts and novices in pedagogics expanded queries supported by the ERIC thesaurus, and how this was connected to the search success in an easy and a diffi...
Anne Sihvonen, Pertti Vakkari
ICASSP
2010
IEEE
13 years 9 months ago
Phone recognition using Restricted Boltzmann Machines
For decades, Hidden Markov Models (HMMs) have been the state-of-the-art technique for acoustic modeling despite their unrealistic independence assumptions and the very limited rep...
Abdel-rahman Mohamed, Geoffrey E. Hinton