Sciweavers

989 search results - page 20 / 198
» HowNet and Its Computation of Meaning
Sort
View
SEFM
2009
IEEE
15 years 4 months ago
A Computability Perspective on Self-Modifying Programs
Abstract—In order to increase their stealth, malware commonly use the self-modification property of programs. By doing so, programs can hide their real code so that it is diffi...
Guillaume Bonfante, Jean-Yves Marion, Daniel Reyna...
GLOBECOM
2006
IEEE
15 years 3 months ago
Resource Optimization Subject to a Percentile Response Time SLA for Enterprise Computing
— We consider a set of computer resources used by a service provider to host enterprise applications subject to service level agreements. We present an approach for resource opti...
Kaiqi Xiong, Harry G. Perros
CRYPTO
2001
Springer
144views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
In this paper we show that any two-party functionality can be securely computed in a constant number of rounds, where security is obtained against malicious adversaries that may ar...
Yehuda Lindell
COLT
2000
Springer
15 years 1 months ago
Computable Shell Decomposition Bounds
Haussler, Kearns, Seung and Tishby introduced the notion of a shell decomposition of the union bound as a means of understanding certain empirical phenomena in learning curves suc...
John Langford, David A. McAllester
DAC
2009
ACM
15 years 10 months ago
Human computing for EDA
Electronic design automation is a field replete with challenging ? and often intractable ? problems to be solved over very large instances. As a result, the field of design automa...
Andrew DeOrio, Valeria Bertacco