Sciweavers

6960 search results - page 1098 / 1392
» Continuity Analysis of Programs
Sort
View
IFIP
2010
Springer
14 years 11 months ago
Reasoning about Probabilistic Security Using Task-PIOAs
Abstract. Task-structured probabilistic input/output automata (taskPIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framewo...
Aaron D. Jaggard, Catherine Meadows, Michael Mislo...
JGO
2010
100views more  JGO 2010»
14 years 11 months ago
On convex relaxations of quadrilinear terms
The best known method to find exact or at least -approximate solutions to polynomial programming problems is the spatial Branch-and-Bound algorithm, which rests on computing lower...
Sonia Cafieri, Jon Lee, Leo Liberti
LLC
2010
14 years 11 months ago
Communicating about Communication: Multidisciplinary Approaches to Educating Educators about Language Variation
The quest to educate nonstandardized Englishspeaking students has been a primary driving force behind developments in many fields represented by Compass journals, including socio...
Christine Mallinson, Anne H. Charity Hudley
CISS
2010
IEEE
14 years 8 months ago
Frame permutation quantization
—Frame permutation quantization (FPQ) is a new vector quantization technique using finite frames. In FPQ, a vector is encoded using a permutation source code to quantize its fra...
Ha Quy Nguyen, Vivek K. Goyal, Lav R. Varshney
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 8 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
« Prev « First page 1098 / 1392 Last » Next »