Sciweavers

785 search results - page 98 / 157
» Two remarks on remotality
Sort
View
ACISP
2004
Springer
14 years 3 months ago
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
The XTR public key system was introduced at Crypto 2000. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead...
Dong-Guk Han, Jongin Lim, Kouichi Sakurai
IMR
2004
Springer
14 years 3 months ago
Mesh Movement Governed by Entropy Production
The aim of this paper is to study the feasibility of using (irreversible) entropy production as driving force for a moving mesh. Such a method should be able to capture or track p...
Edwin M. Knobbe
ECAL
1999
Springer
14 years 2 months ago
Evolution of Neural Controllers with Adaptive Synapses and Compact Genetic Encoding
Abstract. This paper is concerned with arti cial evolution of neurocontrollers with adaptive synapses for autonomous mobile robots. The method consists of encoding on the genotype ...
Dario Floreano, Joseba Urzelai
AAAI
2008
14 years 11 days ago
A Theory of Expressiveness in Mechanisms
A key trend in (electronic) commerce is a demand for higher levels of expressiveness in the mechanisms that mediate interactions. We develop a theory that ties the expressiveness ...
Michael Benisch, Norman M. Sadeh, Tuomas Sandholm
ESOP
2008
Springer
13 years 11 months ago
Verification of Higher-Order Computation: A Game-Semantic Approach
Abstract. We survey recent developments in an approach to the verification of higher-order computation based on game semantics. Higherorder recursion schemes are in essence (progra...
C.-H. Luke Ong