Sciweavers

563 search results - page 43 / 113
» A Typing Scheme for Behavioural Models
Sort
View
IJACT
2008
83views more  IJACT 2008»
14 years 12 months ago
On the relation among various security models for certificateless cryptography
: Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and se...
Qiong Huang, Duncan S. Wong
TASLP
2010
99views more  TASLP 2010»
14 years 10 months ago
A Virtual Model of Spring Reverberation
—The digital emulation of analog audio effects and synthesis components, through the simulation of lumped circuit components has seen a large amount of activity in recent years; ...
Stefan Bilbao, Julian Parker
EUROGP
2007
Springer
145views Optimization» more  EUROGP 2007»
15 years 3 months ago
GP Classifier Problem Decomposition Using First-Price and Second-Price Auctions
This work details an auction-based model for problem decomposition in Genetic Programming classification. The approach builds on the population-based methodology of Genetic Progra...
Peter Lichodzijewski, Malcolm I. Heywood
CLIMA
2007
15 years 1 months ago
Actions with Failures in Interval Temporal Logic
Abstract. Failures are unavoidable in many circumstances. For example, an agent may fail at some point to perform a task in a dynamic environment. Robust systems typically have mec...
Arjen Hommersom, Peter J. F. Lucas
SIAMDM
2010
114views more  SIAMDM 2010»
14 years 10 months ago
Rank-Based Attachment Leads to Power Law Graphs
Abstract. We investigate the degree distribution resulting from graph generation models based on rank-based attachment. In rank-based attachment, all vertices are ranked according ...
Jeannette Janssen, Pawel Pralat