Sciweavers

3047 search results - page 452 / 610
» On the Meaning of Logical Completeness
Sort
View
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
14 years 11 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel
CSL
2008
Springer
14 years 11 months ago
An Optimal Strategy Improvement Algorithm for Solving Parity and Payoff Games
This paper presents a novel strategy improvement algorithm for parity and payoff games, which is guaranteed to select, in each improvement step, an optimal combination of local str...
Sven Schewe
ESEM
2008
ACM
14 years 11 months ago
Are good code reviewers also good at design review?
Software review is a necessity activity to build high reliability software in software development. In this paper, we experimentally analyze the difference in performance between ...
Hidetake Uwano, Akito Monden, Ken-ichi Matsumoto
AAAI
2010
14 years 11 months ago
Probabilistic Plan Recognition Using Off-the-Shelf Classical Planners
Plan recognition is the problem of inferring the goals and plans of an agent after observing its behavior. Recently, it has been shown that this problem can be solved efficiently,...
Miquel Ramírez, Hector Geffner
BILDMED
2007
115views Algorithms» more  BILDMED 2007»
14 years 11 months ago
Method for Projecting Functional 3D Information onto Anatomic Surfaces
Today the main challenge in cancer surgery is increasing the accuracy in tumor resections. Malignant cells must be completely removed, while harm to the surrounding healthy tissue ...
Oleg Kishenkov, Thomas Wendler, Jörg Traub, S...