Sciweavers

677 search results - page 91 / 136
» Dependent Types from Counterexamples
Sort
View
FOCI
2007
IEEE
15 years 4 months ago
Waiting time analysis of foreign currency exchange rates: Beyond the renewal-reward theorem
— We evaluate the average waiting time between observing the price of financial markets and the next price change, especially in an on-line foreign exchange trading service for ...
Naoya Sazuka, Jun-ichi Inoue
IEEESCC
2007
IEEE
15 years 4 months ago
Intelligent Document Gateway - A Ser vice System Analysis
In today’s fast paced world, it is necessary to process business documents expediently, accurately, and diligently. In other words, processing has to be fast, errors must be pre...
Vikas Krishna, John Bailey, Ana Lelescu
CRYPTO
2007
Springer
143views Cryptology» more  CRYPTO 2007»
15 years 4 months ago
A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU
To date the NTRUEncrypt security parameters have been based on the existence of two types of attack: a meet-in-the-middle attack due to Odlyzko, and a conservative extrapolation of...
Nick Howgrave-Graham
ICMCS
2006
IEEE
100views Multimedia» more  ICMCS 2006»
15 years 3 months ago
A Novel Resynchronization Method for Scalable Video Over Wireless Channel
A scalable video coder generates scalable compressed bitstream, which can provide different types of scalability depend on different requirements. This paper proposes a novel resy...
Yu Wang, Lap-Pui Chau, Kim-Hui Yap
IJCNN
2006
IEEE
15 years 3 months ago
Data Fusion for Outlier Detection through Pseudo-ROC Curves and Rank Distributions
— This paper proposes a novel method of fusing models for classification of unbalanced data. The unbalanced data contains a majority of healthy (negative) instances, and a minor...
Paul F. Evangelista, Mark J. Embrechts, Boleslaw K...