Sciweavers

6258 search results - page 63 / 1252
» Applied Text Generation
Sort
View
APLAS
2009
ACM
15 years 4 months ago
The Higher-Order, Call-by-Value Applied Pi-Calculus
We define a higher-order process calculus with algebraic operations such as encryption and decryption, and develop a bisimulation proof method for behavioral equivalence in this c...
Nobuyuki Sato, Eijiro Sumii
GECCO
2005
Springer
128views Optimization» more  GECCO 2005»
15 years 3 months ago
Evolutionary computation applied to the tuning of MEMS gyroscopes
We propose a tuning method for MEMS gyroscopes based on evolutionary computation to efficiently increase the sensitivity of MEMS gyroscopes through tuning and, furthermore, to fin...
Didier Keymeulen, Wolfgang Fink, Michael I. Fergus...
GECCO
2004
Springer
197views Optimization» more  GECCO 2004»
15 years 3 months ago
Applying Evolutionary Testing to Search for Critical Defects
Software systems are used regularly in safety-relevant applications. Therefore, the occurrence of critical defects may not only cause costly recalls but may also endanger human liv...
André Baresel, Harmen Sthamer, Joachim Wege...
GECCO
2004
Springer
211views Optimization» more  GECCO 2004»
15 years 3 months ago
Node-Depth Encoding for Evolutionary Algorithms Applied to Network Design
Network design involves several areas of engineering and science. Computer networks, electrical circuits, transportation problems, and phylogenetic trees are some examples. In gene...
Alexandre C. B. Delbem, André Carlos Ponce ...
TCC
2004
Springer
100views Cryptology» more  TCC 2004»
15 years 3 months ago
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
In earlier work, we described a “pathological” example of a signature scheme that is secure in the Random Oracle Model, but for which no secure implementation exists. For that...
Ran Canetti, Oded Goldreich, Shai Halevi