Sciweavers

3394 search results - page 543 / 679
» A Modal Model of Memory
Sort
View
SPC
2005
Springer
15 years 10 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
TLCA
2005
Springer
15 years 10 months ago
L3: A Linear Language with Locations
We explore foundational typing support for strong updates — updating a memory cell to hold values of unrelated types at different points in time. We present a simple, but expres...
Greg Morrisett, Amal J. Ahmed, Matthew Fluet
WADS
2005
Springer
114views Algorithms» more  WADS 2005»
15 years 10 months ago
Subquadratic Algorithms for 3SUM
We obtain subquadratic algorithms for 3SUM on integers and rationals in several models. On a standard word RAM with w-bit words, we obtain a running time of O(n2 / max{ w lg2 w , ...
Ilya Baran, Erik D. Demaine, Mihai Patrascu
CBSE
2004
Springer
15 years 9 months ago
Prediction of Run-Time Resource Consumption in Multi-task Component-Based Software Systems
Embedded systems must be cost-effective. This imposes strict requirements on the resource consumption of their applications. It is therefore desirable to be able to determine the ...
Johan Muskens, Michel R. V. Chaudron
GECCO
2004
Springer
212views Optimization» more  GECCO 2004»
15 years 9 months ago
An Evolutionary Autonomous Agent with Visual Cortex and Recurrent Spiking Columnar Neural Network
Spiking neural networks are computationally more powerful than conventional artificial neural networks. Although this fact should make them especially desirable for use in evoluti...
Rich Drewes, James B. Maciokas, Sushil J. Louis, P...