Sciweavers

984 search results - page 120 / 197
» ideas 2010
Sort
View
CORR
2010
Springer
60views Education» more  CORR 2010»
15 years 4 months ago
A Novel Scheme for Secured Data Transfer Over Computer Networks
: This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a `jigsaw puzzle&#...
Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal
CORR
2010
Springer
54views Education» more  CORR 2010»
15 years 4 months ago
Development of a Cargo Screening Process Simulator: A First Approach
The efficiency of current cargo screening processes at sea and air ports is largely unknown as few benchmarks exists against which they could be measured. Some manufacturers provi...
Peer-Olaf Siebers, Galina Sherman, Uwe Aickelin
CORR
2010
Springer
148views Education» more  CORR 2010»
15 years 4 months ago
Perturbation Resilience and Superiorization of Iterative Algorithms
Iterative algorithms aimed at solving some problems are discussed. For certain problems, such as finding a common point in the intersection of a finite number of convex sets, there...
Yair Censor, R. Davidi, Gabor T. Herman
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 4 months ago
Redundancies in Dependently Typed Lambda Calculi and Their Relevance to Proof Search
Dependently typed -calculi such as the Logical Framework (LF) are capable of representing relationships between terms through types. By exploiting the "formulas-as-types"...
Zachary Snow, David Baelde, Gopalan Nadathur
CORR
2010
Springer
157views Education» more  CORR 2010»
15 years 4 months ago
Deriving Specifications of Dependable Systems: toward a Method
Abstract--This paper proposes a method for deriving formal specifications of systems. To accomplish this task we pass through a non trivial number of steps, concepts and tools wher...
Manuel Mazzara