Sciweavers

322 search results - page 21 / 65
» Expressive power and abstraction in Essence
Sort
View
EUROCRYPT
2010
Springer
15 years 4 months ago
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles an...
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tr...
PKC
2012
Springer
234views Cryptology» more  PKC 2012»
13 years 2 months ago
Ring-LWE in Polynomial Rings
Abstract. The Ring-LWE problem, introduced by Lyubashevsky, Peikert, and Regev (Eurocrypt 2010), has been steadily finding many uses in numerous cryptographic applications. Still,...
Léo Ducas, Alain Durmus
ECAI
1994
Springer
15 years 3 months ago
Using Domain Knowledge to Select Solutions in Abductive Diagnosis
Abstract. This paper presents a novel extension to abductive reasoning in causal nets, namely the use of domain knowledge to select among alternative diagnoses. We describe how pre...
Frank van Harmelen, Annette ten Teije
DAWAK
2009
Springer
15 years 4 months ago
What Is Spatio-Temporal Data Warehousing?
Abstract. In the last years, extending OLAP (On-Line Analytical Processing) systems with spatial and temporal features has attracted the attention of of the GIS (Geographic Informa...
Alejandro A. Vaisman, Esteban Zimányi
80
Voted
CDC
2009
IEEE
160views Control Systems» more  CDC 2009»
15 years 4 months ago
Receding horizon temporal logic planning for dynamical systems
— This paper bridges the advances in computer science and control to allow automatic synthesis of control strategies for complex dynamical systems which are guaranteed, by constr...
Tichakorn Wongpiromsarn, Ufuk Topcu, R. Richard Mu...