Sciweavers

677 search results - page 65 / 136
» Dependent Types from Counterexamples
Sort
View
ATAL
2005
Springer
15 years 3 months ago
Trust evaluation through relationship analysis
Current mechanisms for evaluating the trustworthiness of an agent within an electronic marketplace depend either on using a history of interactions or on recommendations from othe...
Ronald Ashri, Sarvapali D. Ramchurn, Jordi Sabater...
90
Voted
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
15 years 3 months ago
Cellular Programming and Symmetric Key Cryptography Systems
Abstract. The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process ...
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
FCCM
2002
IEEE
133views VLSI» more  FCCM 2002»
15 years 2 months ago
Reconfigurable Shape-Adaptive Template Matching Architectures
This paper presents three reconfigurable computing approaches for a Shape-Adaptive Template Matching (SA-TM) method to retrieve arbitrarily shaped objects within images or video f...
Jörn Gause, Peter Y. K. Cheung, Wayne Luk
VISUALIZATION
2000
IEEE
15 years 2 months ago
A flow-guided streamline seeding strategy
This paper presents a seed placement strategy for streamlines based on flow features in the dataset. The primary goal of our seeding strategy is to capture flow patterns in the ...
Vivek Verma, David T. Kao, Alex Pang
ICS
1999
Tsinghua U.
15 years 2 months ago
Clustered speculative multithreaded processors
In this paper we present a processor microarchitecture that can simultaneously execute multiple threads and has a clustered design for scalability purposes. A main feature of the ...
Pedro Marcuello, Antonio González