Sciweavers

696 search results - page 63 / 140
» Explaining abstract counterexamples
Sort
View
SCN
2004
Springer
121views Communications» more  SCN 2004»
15 years 8 months ago
ECRYPT: The Cryptographic Research Challenges for the Next Decade
Abstract. In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political contr...
Bart Preneel
130
Voted
SCVMA
2004
Springer
15 years 8 months ago
On the Relationship Between Image and Motion Segmentation
Abstract. In this paper we present a generative model for image sequences, which can be applied to motion segmentation and tracking, and to image sequence compression. The model co...
Adrian Barbu, Song Chun Zhu
160
Voted
SEM
2004
Springer
15 years 8 months ago
Towards the Development of Ubiquitous Middleware Product Lines
Abstract. Ubiquitous computing is a challenge for the design of middleware. The reasons are resource constraints, mobility, heterogeneity, etc., just to name a few. We argue that s...
Sven Apel, Klemens Böhm
DATE
2003
IEEE
130views Hardware» more  DATE 2003»
15 years 8 months ago
Noise Macromodel for Radio Frequency Integrated Circuits
† Noise performance is a critical analog and RF circuit design constraint, and can impact the selection of the IC system-level architecture. It is therefore imperative that some ...
Yang Xu, Xin Li, Peng Li, Lawrence T. Pileggi
AWIC
2003
Springer
15 years 8 months ago
A Machine Learning Based Evaluation of a Negotiation between Agents Involving Fuzzy Counter-Offers
Abstract. Negotiation plays a fundamental role in systems composed of multiple autonomous agents. Some negotiations may require a more elaborated dialogue where agents would explai...
Javier Carbo Rubiera, Agapito Ledezma