Sciweavers

2392 search results - page 390 / 479
» informs 2000
Sort
View
ACISP
2000
Springer
14 years 2 months ago
Cryptanalysis of the m-Permutation Protection Schemes
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP'98, Fung and Gray proposed an −m permutation protecti...
Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
ADL
2000
Springer
251views Digital Library» more  ADL 2000»
14 years 2 months ago
Efficient Similarity Search in Digital Libraries
Digital libraries are a core information technology. When the stored data is complex, e.g. high-resolution images or molecular protein structures, simple query types like the exac...
Christian Böhm, Bernhard Braunmüller, Ha...
AFPAC
2000
Springer
257views Mathematics» more  AFPAC 2000»
14 years 2 months ago
The Multidimensional Isotropic Generalization of Quadrature Filters in Geometric Algebra
In signal processing, the approach of the analytic signal is a capable and often used method. For signals of finite length, quadrature filters yield a bandpass filtered approxim...
Michael Felsberg, Gerald Sommer
AGENTCL
2000
Springer
14 years 2 months ago
Operational Semantics for Agent Communication Languages
Abstract. In this paper, we study the operational semantics of agent communication languages.We develop a basic multi-agent programming language for systems of concurrently operati...
Rogier M. van Eijk, Frank S. de Boer, Wiebe van de...
AGENTCL
2000
Springer
14 years 2 months ago
Semantics of Communicating Agents Based on Deduction and Abduction
Intelligent agents in the agent language 3APL are computational entities consisting of beliefs and goals which make up their mental state. In this paper, we integrate communicatio...
Koen V. Hindriks, Frank S. de Boer, Wiebe van der ...