Sciweavers

678 search results - page 87 / 136
» The Theory of Weak Stabilization
Sort
View
PKC
1999
Springer
83views Cryptology» more  PKC 1999»
14 years 1 months ago
On the Security of Random Sources
Abstract. Many applications rely on the security of their random number generator. It is therefore essential that such devices be extensively tested for malfunction. The purpose of...
Jean-Sébastien Coron
LICS
1990
IEEE
14 years 26 days ago
Normal Process Representatives
This paper discusses the relevance of a form of cut elimination theorem for linear logic tensor theories to the concept of a process on a Petri net. We base our discussion on two ...
Vijay Gehlot, Carl A. Gunter
COMPGEOM
2007
ACM
14 years 23 days ago
An optimal generalization of the centerpoint theorem, and its extensions
We prove an optimal generalization of the centerpoint theorem: given a set P of n points in the plane, there exist two points (not necessarily among input points) that hit all con...
Saurabh Ray, Nabil H. Mustafa
IAT
2009
IEEE
14 years 21 days ago
Efficient Distributed Bayesian Reasoning via Targeted Instantiation of Variables
Abstract--This paper is focusing on exact Bayesian reasoning in systems of agents, which represent weakly coupled processing modules supporting collaborative inference through mess...
Patrick de Oude, Gregor Pavlin
VL
1991
IEEE
183views Visual Languages» more  VL 1991»
14 years 10 days ago
The Conceptual Programming Environment, CP: Reasoning Representation using Graph Structures and Operations
The Conceptual Programming environment, CP, being developed at the Computing Research Laboratory (CRL), is a complete knowledge representation visual programming environment for u...
Heather Pfeiffer, Roger T. Hartley