Sciweavers

709 search results - page 94 / 142
» An Equational Theory for Transactions
Sort
View
IMAGING
2004
15 years 17 days ago
Extending Printing Color Gamut by Optimizing the Spectral Reflectance of Inks
A computer simulation was performed to investigate the optimum combinations of three- and four-chromatic inks in order to maximize the color gamut for halftone printing. A virtual...
Yongda Chen, Roy S. Berns, Lawrence A. Taplin
CSR
2009
Springer
15 years 8 days ago
Approximability of the Maximum Solution Problem for Certain Families of Algebras
We study the approximability of the maximum solution problem. This problem is an optimisation variant of the constraint satisfaction problem and it captures a wide range of interes...
Peter Jonsson, Johan Thapper
ICML
2010
IEEE
15 years 7 days ago
Supervised Aggregation of Classifiers using Artificial Prediction Markets
Prediction markets are used in real life to predict outcomes of interest such as presidential elections. In this work we introduce a mathematical theory for Artificial Prediction ...
Nathan Lay, Adrian Barbu
CORR
2010
Springer
151views Education» more  CORR 2010»
14 years 11 months ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade
CORR
2010
Springer
102views Education» more  CORR 2010»
14 years 11 months ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi