Sciweavers

27692 search results - page 5476 / 5539
» Where is ...
Sort
View
ACNS
2011
Springer
254views Cryptology» more  ACNS 2011»
12 years 11 months ago
Linear Analysis of Reduced-Round CubeHash
Abstract. Recent developments in the field of cryptanalysis of hash functions has inspired NIST to announce a competition for selecting a new cryptographic hash function to join t...
Tomer Ashur, Orr Dunkelman
AIPS
2011
12 years 11 months ago
Cross-Domain Action-Model Acquisition for Planning via Web Search
Applying learning techniques to acquire action models is an area of intense research interest. Most previous works in this area have assumed that there is a significant amount of...
Hankz Hankui Zhuo, Qiang Yang, Rong Pan, Lei Li
AIPS
2011
12 years 11 months ago
Planning and Acting in Incomplete Domains
Engineering complete planning domain descriptions is often very costly because of human error or lack of domain knowledge. Learning complete domain descriptions is also very chall...
Christopher Weber, Daniel Bryce
ALGORITHMICA
2011
12 years 11 months ago
Algorithms for Marketing-Mix Optimization
Algorithms for determining quality/cost/price tradeoffs in saturated markets are consid-3 ered. A product is modeled by d real-valued qualities whose sum determines the unit cost ...
Joachim Gudmundsson, Pat Morin, Michiel H. M. Smid
ASPLOS
2011
ACM
12 years 11 months ago
Specifying and checking semantic atomicity for multithreaded programs
In practice, it is quite difficult to write correct multithreaded programs due to the potential for unintended and nondeterministic interference between parallel threads. A funda...
Jacob Burnim, George C. Necula, Koushik Sen
« Prev « First page 5476 / 5539 Last » Next »