Sciweavers

854 search results - page 125 / 171
» Abstracting from Failure Probabilities
Sort
View
FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 5 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
ECCV
2000
Springer
16 years 3 months ago
Learning Over Multiple Temporal Scales in Image Databases
Abstract. The ability to learn from user interaction is an important asset for content-based image retrieval (CBIR) systems. Over short times scales, it enables the integration of ...
Nuno Vasconcelos, Andrew Lippman
IPPS
2007
IEEE
15 years 8 months ago
A Key-based Adaptive Transactional Memory Executor
Software transactional memory systems enable a programmer to easily write concurrent data structures such as lists, trees, hashtables, and graphs, where non-conflicting operation...
Tongxin Bai, Xipeng Shen, Chengliang Zhang, Willia...
CEC
2005
IEEE
15 years 7 months ago
A model-based evolutionary algorithm for bi-objective optimization
Abstract- The Pareto optimal solutions to a multiobjective optimization problem often distribute very regularly in both the decision space and the objective space. Most existing ev...
Aimin Zhou, Qingfu Zhang, Yaochu Jin, Edward P. K....
MKM
2005
Springer
15 years 7 months ago
Determining Empirical Characteristics of Mathematical Expression Use
Abstract. Many processes in mathematical computing try to use knowledge of the most desired forms of mathematical expressions. This occurs, for example, in symbolic computation sys...
Clare M. So, Stephen M. Watt