Sciweavers

2314 search results - page 95 / 463
» What's in a model
Sort
View
RSA
2010
118views more  RSA 2010»
13 years 4 months ago
Asymptotic equivalence and contiguity of some random graphs
We show that asymptotic equivalence, in a strong form, holds between two random graph models with slightly differing edge probabilities under substantially weaker conditions than w...
Svante Janson
WSC
1997
13 years 11 months ago
A Simulation-Based Production Testbed
Researchers at the National Institute of Standards and Technology have been developing a simulation-based production testbed. This testbed contains continuous simulation models of...
Albert Jones, Michael Iuliano
PAIRING
2010
Springer
149views Cryptology» more  PAIRING 2010»
13 years 8 months ago
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
Abstract. We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in s...
Dario Fiore, Rosario Gennaro, Nigel P. Smart
AAAI
2007
14 years 12 days ago
On the Prospects for Building a Working Model of the Visual Cortex
Human visual capability has remained largely beyond the reach of engineered systems despite intensive study and considerable progress in problem understanding, algorithms and comp...
Thomas Dean, Glenn Carroll, Richard Washington
SPAA
1998
ACM
14 years 2 months ago
Computation-Centric Memory Models
We present a computation-centric theory of memory models. Unlike traditional processor-centric models, computation-centric models focus on the logical dependencies among instructi...
Matteo Frigo, Victor Luchangco