Sciweavers

3820 search results - page 641 / 764
» Bounded Model Debugging
Sort
View
114
Voted
CRYPTO
2003
Springer
87views Cryptology» more  CRYPTO 2003»
15 years 7 months ago
Private Circuits: Securing Hardware against Probing Attacks
Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider the problem of protecting privacy in circuits, when faced with an adversary that can access ...
Yuval Ishai, Amit Sahai, David Wagner
IPSN
2003
Springer
15 years 7 months ago
Energy Based Acoustic Source Localization
A novel source localization approach using acoustic energy measurements from the individual sensors in the sensor field is presented. This new approach is based on the acoustic en...
Xiaohong Sheng, Yu Hen Hu
ISMIS
2003
Springer
15 years 7 months ago
Classifying Document Titles Based on Information Inference
We propose an intelligent document title classification agent based on a theory of information inference. The information is represented as vectorial spaces computed by a cognitive...
Dawei Song, Peter Bruza, Zi Huang, Raymond Y. K. L...
COMPGEOM
2010
ACM
15 years 7 months ago
Output-sensitive algorithm for the edge-width of an embedded graph
Let G be an unweighted graph of complexity n cellularly embedded in a surface (orientable or not) of genus g. We describe improved algorithms to compute (the length of) a shortest...
Sergio Cabello, Éric Colin de Verdiè...
PODS
2010
ACM
205views Database» more  PODS 2010»
15 years 7 months ago
Positive higher-order queries
We investigate a higher-order query language that embeds operators of the positive relational algebra within the simply-typed λ-calculus. Our language allows one to succinctly de...
Michael Benedikt, Gabriele Puppis, Huy Vu