Sciweavers

860 search results - page 137 / 172
» Completeness in two-party secure computation: a computationa...
Sort
View
HICSS
2003
IEEE
198views Biometrics» more  HICSS 2003»
15 years 3 months ago
Allocating Time and Resources in Project Management Under Uncertainty
We define and develop a solution approach for planning, scheduling and managing project efforts where there is significant uncertainty in the duration, resource requirements and o...
Mark A. Turnquist, Linda K. Nozick
ICVS
2003
Springer
15 years 3 months ago
A Framework for Visual Servoing
We consider typical manipulation tasks in terms of a service robot framework. Given a task at hand, such as ”Pick up the cup from the dinner table”, we present a number of diff...
Danica Kragic, Henrik I. Christensen
CAV
2001
Springer
121views Hardware» more  CAV 2001»
15 years 2 months ago
A Practical Approach to Coverage in Model Checking
In formal verification, we verify that a system is correct with respect to a specification. When verification succeeds and the system is proven to be correct, there is still a q...
Hana Chockler, Orna Kupferman, Robert P. Kurshan, ...
LICS
1990
IEEE
15 years 1 months ago
Extensional PERs
In the paper "Extensional PERs" by P. Freyd, P. Mulry, G. Rosolini and D. Scott, a category C of "pointed complete extensional PERs" and computable maps is int...
Peter J. Freyd, P. Mulry, Giuseppe Rosolini, Dana ...
GECCO
2006
Springer
129views Optimization» more  GECCO 2006»
15 years 1 months ago
Revisiting evolutionary algorithms with on-the-fly population size adjustment
In an evolutionary algorithm, the population has a very important role as its size has direct implications regarding solution quality, speed, and reliability. Theoretical studies ...
Fernando G. Lobo, Cláudio F. Lima