Sciweavers

1982 search results - page 284 / 397
» Parametricity and dependent types
Sort
View
FSE
2005
Springer
106views Cryptology» more  FSE 2005»
15 years 3 months ago
New Applications of T-Functions in Block Ciphers and Hash Functions
A T-function is a mapping from n-bit words to n-bit words in which for each 0 ≤ i < n, bit i of any output word can depend only on bits 0, 1, . . . , i of any input word. All ...
Alexander Klimov, Adi Shamir
ICSE
2005
IEEE-ACM
15 years 3 months ago
Component-based software engineering for embedded systems
Although attractive, CBD has not been widely adopted in domains of embedded systems. The main reason is inability of these technologies to cope with the important concerns of embe...
Ivica Crnkovic
76
Voted
IPTPS
2005
Springer
15 years 3 months ago
A Statistical Theory of Chord Under Churn
Most earlier studies of DHTs under churn have either depended on simulations as the primary investigation tool, or on establishing bounds for DHTs to function. In this paper, we pr...
Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurel...
LAMAS
2005
Springer
15 years 3 months ago
Unifying Convergence and No-Regret in Multiagent Learning
We present a new multiagent learning algorithm, RVσ(t), that builds on an earlier version, ReDVaLeR . ReDVaLeR could guarantee (a) convergence to best response against stationary ...
Bikramjit Banerjee, Jing Peng
SCIA
2005
Springer
174views Image Analysis» more  SCIA 2005»
15 years 3 months ago
Object Localization with Boosting and Weak Supervision for Generic Object Recognition
Abstract. This paper deals, for the first time, with an analysis of localization capabilities of weakly supervised categorization systems. Most existing categorization approaches ...
Andreas Opelt, Axel Pinz