Sciweavers

4498 search results - page 706 / 900
» How to Invent Functions
Sort
View
ECCC
2007
144views more  ECCC 2007»
15 years 4 months ago
Algebraic Lower Bounds for Computing on Encrypted Data
In cryptography, there has been tremendous success in building primitives out of homomorphic semantically-secure encryption schemes, using homomorphic properties in a blackbox way...
Rafail Ostrovsky, William E. Skeith III
JHSN
2006
96views more  JHSN 2006»
15 years 4 months ago
Supporting heterogeneous middleware security policies in WebCom
With the growing interest in service-oriented architectures, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. W...
Simon N. Foley, Barry P. Mulcahy, Thomas B. Quilli...
JIRS
2006
74views more  JIRS 2006»
15 years 4 months ago
Exploratory Navigation Based on Dynamical Boundary Value Problems
The paper presents a general framework for concurrent navigation and exploration of unknown environments based on discrete potential fields that guide the robot motion. These poten...
Marcelo Trevisan, Marco Aurélio Pires Idiar...
ENTCS
2007
95views more  ENTCS 2007»
15 years 4 months ago
Hybridizing a Logical Framework
Logical connectives familiar from the study of hybrid logic can be added to the logical framework LF, a constructive type theory of dependent functions. This extension turns out t...
Jason Reed
ENTCS
2007
115views more  ENTCS 2007»
15 years 4 months ago
Self Management and the Future of Software Design
Most software is fragile: even the slightest error, such as changing a single bit, can make it crash. As software complexity has increased, development techniques have kept pace t...
Peter Van Roy