Sciweavers

6039 search results - page 1130 / 1208
» The Function Space of an Activity
Sort
View
EUROCRYPT
1999
Springer
14 years 7 days ago
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives. We introduce a general model...
Ivan Damgård, Joe Kilian, Louis Salvail
GECCO
1999
Springer
130views Optimization» more  GECCO 1999»
14 years 7 days ago
Heterochrony and Adaptation in Developing Neural Networks
This paper discusses the simulation results of a model of biological development for neural networks based on a regulatory genome. The model’s results are analyzed using the fra...
Angelo Cangelosi
ICLP
1999
Springer
14 years 7 days ago
Logic Programming in Oz with Mozart
Oz is a multiparadigm language that supports logic programming as one of its major paradigms. A multiparadigm language is designed to support different programming paradigms (log...
Peter Van Roy
SIGADA
1999
Springer
14 years 7 days ago
Redistribution in distributed Ada
In this paper we will demonstrate how Ada and its Distributed Annex may be used to relocate concurrent objects in a distributed data ow application. This relocation mechanism will...
Scott James
SAFECOMP
1998
Springer
14 years 5 days ago
An Agenda for Specifying Software Components with Complex Data Models
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Kirsten Winter, Thomas Santen, Maritta Heisel
« Prev « First page 1130 / 1208 Last » Next »