Sciweavers

2024 search results - page 313 / 405
» A Formal Model of Multi-agent Computations
Sort
View
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 11 months ago
Does intelligence imply contradiction?
Contradiction is often seen as a defect of intelligent systems and a dangerous limitation on efficiency. In this paper we raise the question of whether, on the contrary, it could ...
Patrizio Frosini
CORR
2008
Springer
81views Education» more  CORR 2008»
14 years 11 months ago
The Golden Ratio Encoder
This paper proposes a novel Nyquist-rate analog-to-digital (A/D) conversion algorithm which achieves exponential accuracy in the bit-rate despite using imperfect components. The p...
Ingrid Daubechies, C. Sinan Güntürk, Y. ...
ENTCS
2008
72views more  ENTCS 2008»
14 years 11 months ago
Towards a Notion of Transaction in Graph Rewriting
We define transactional graph transformation systems (t-gtss), a mild extension of the ordinary framework for the double-pushout approach to graph transformation, which allows to ...
Paolo Baldan, Andrea Corradini, Fernando Luí...
CAGD
2006
97views more  CAGD 2006»
14 years 11 months ago
Conditions for use of a non-selfintersection conjecture
Abstract. Volino and Thalmann have published a conjecture proposing sufficient conditions for non-selfintersection of surfaces. Such conditions may be used in solid modeling, compu...
Lars-Erik Andersson, Neil F. Stewart, Malika Zidan...
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
14 years 11 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu