Sciweavers

157 search results - page 22 / 32
» Presenting Proofs with Adapted Granularity
Sort
View
CSL
2007
Springer
15 years 8 months ago
Typed Normal Form Bisimulation
Normal form bisimulation is a powerful theory of program equivalence, originally developed to characterize L´evy-Longo tree equivalence and Boehm tree equivalence. It has been ada...
Søren B. Lassen, Paul Blain Levy
139
Voted
EUROCRYPT
2000
Springer
15 years 5 months ago
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against adaptive chosen ciphertext attack provided the Decision...
Victor Shoup
136
Voted
CEC
2008
IEEE
15 years 3 months ago
Creature Academy: A system for virtual creature evolution
In this paper, we present Creature Academy, a virtual laboratory that allows for the evolution of form and function within simulated physical 3D environments. Creature Academy can ...
Marcin L. Pilat, Christian Jacob
SCP
2011
255views Communications» more  SCP 2011»
14 years 8 months ago
Map fusion for nested datatypes in intensional type theory
A definitional extension LNGMIt of the Calculus of Inductive Constructions (CIC), that underlies the proof assistant Coq, is presented that allows also to program with nested dat...
Ralph Matthes
124
Voted
ICML
2009
IEEE
16 years 2 months ago
Online dictionary learning for sparse coding
Sparse coding--that is, modelling data vectors as sparse linear combinations of basis elements--is widely used in machine learning, neuroscience, signal processing, and statistics...
Julien Mairal, Francis Bach, Jean Ponce, Guillermo...