Sciweavers

412 search results - page 68 / 83
» A New Proof of the F5 Algorithm
Sort
View
PERCOM
2005
ACM
15 years 9 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
PLPV
2009
ACM
15 years 6 months ago
Embedding a logical theory of constructions in Agda
We propose a new way to reason about general recursive functional programs in the dependently typed programming language Agda, which is based on Martin-L¨of’s intuitionistic ty...
Ana Bove, Peter Dybjer, Andrés Sicard-Ram&i...
ICC
2009
IEEE
114views Communications» more  ICC 2009»
15 years 4 months ago
Distributed Gradient Based Gain Allocation for Coherent Multiuser AF Relaying Networks
—A set of distributed non-cooperating relay antennas is known to be capable of orthogonalizing multiple sourcedestination pairs in space by coherent amplify-and-forward (AF) rela...
Celal Esli, Jörg Wagner, Armin Wittneben
ICALP
2007
Springer
15 years 4 months ago
Reconciling Data Compression and Kolmogorov Complexity
While data compression and Kolmogorov complexity are both about effective coding of words, the two settings differ in the following respect. A compression algorithm or compressor...
Laurent Bienvenu, Wolfgang Merkle
ACL2
2006
ACM
15 years 3 months ago
Phylogenetic trees in ACL2
Biologists studying the evolutionary relationships between organisms use software packages to solve the computational problems they encounter. Several of these problems involve th...
Warren A. Hunt Jr., Serita M. Nelesen