Sciweavers

15375 search results - page 32 / 3075
» cans 2008
Sort
View
CANS
2008
Springer
159views Cryptology» more  CANS 2008»
13 years 9 months ago
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
ded abstract of this paper appeared in Proceedings of the 7th International Conference on Cryptology and Network Security (CANS '08) December 2
Michel Abdalla, Malika Izabachène, David Po...
SLOGICA
2008
54views more  SLOGICA 2008»
13 years 7 months ago
Probabilistic Justification and the Regress Problem
We discuss two objections that foundationalists have raised against infinite chains of probabilistic justification. We demonstrate that neither of the objections can be maintained....
Jeanne Peijnenburg, David Atkinson
ESANN
2008
13 years 9 months ago
Active and reactive use of virtual neural sensors
This paper addresses the possible use of virtual neural sensors, implemented by means of weightless systems, as active or reactive sensors. The latter, made possible by the intrins...
Massimo De Gregorio
CPC
2004
87views more  CPC 2004»
13 years 7 months ago
Quicksort with Unreliable Comparisons: A Probabilistic Analysis
We provide a probabilistic analysis of the output of Quicksort when comparisons can err.
Laurent Alonso, Philippe Chassaing, Florent Gillet...
CROSSROADS
2002
40views more  CROSSROADS 2002»
13 years 7 months ago
Map-based navigation in a graphical MOO
Traditional MUDs and MOOs lack support for global awareness and simple navigation. These problems can be addressed by
Wendy A. Schafer, Doug A. Bowman, John M. Carroll