Sciweavers

7921 search results - page 110 / 1585
» LSH-preserving functions and their applications
Sort
View
LPAR
2005
Springer
15 years 3 months ago
Functional Correctness Proofs of Encryption Algorithms
Abstract. We discuss a collection of mechanized formal proofs of symmetric key block encryption algorithms (AES, MARS, Twofish, RC6, Serpent, IDEA, and TEA), performed in an imple...
Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, K...
POLICY
2005
Springer
15 years 3 months ago
Approximating Service Utility from Policies and Value Function Patterns
Service-oriented computing provides the right means for building flexible systems that allow dynamic configuration and on-the-fly composition. In order to realize this vision, ...
Steffen Lamparter, Daniel Oberle, Andreas Eberhart
VMCAI
2005
Springer
15 years 3 months ago
Model Checking of Systems Employing Commutative Functions
Abstract. The paper presents methods for model checking a class of possibly infinite state concurrent programs using various types of bi-simulation reductions. The proposed method...
A. Prasad Sistla, Min Zhou, Xiaodong Wang
GECCO
2004
Springer
116views Optimization» more  GECCO 2004»
15 years 3 months ago
Using Genetic Programming to Obtain a Closed-Form Approximation to a Recursive Function
Abstract. We demonstrate a fully automated method for obtaining a closedform approximation of a recursive function. This method resulted from a realworld problem in which we had a ...
Evan Kirshenbaum, Henri Jacques Suermondt
DCC
2010
IEEE
15 years 3 months ago
Modeling the Quantization Staircase Function
Quantization plays a central role in data compression. In speech systems, vector quantizers are used to compress speech parameters. In video systems, scalar quantizers are used to...
Salman Aslam, Aaron F. Bobick, Christopher F. Barn...