Sciweavers

2517 search results - page 84 / 504
» Specifying Weak Sets
Sort
View
SP
1996
IEEE
101views Security Privacy» more  SP 1996»
15 years 9 months ago
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
We present new results on a distributable changedetection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating...
Patrik D'haeseleer, Stephanie Forrest, Paul Helman
ICALP
1994
Springer
15 years 9 months ago
Simple Fast Parallel Hashing
A hash table is a representation of a set in a linear size data structure that supports constanttime membership queries. We show how to construct a hash table for any given set of...
Joseph Gil, Yossi Matias
158
Voted
TCS
2011
15 years 9 days ago
Computational processes, observers and Turing incompleteness
We propose a formal definition of Wolfram’s notion of computational process based on iterated transducers together with a weak observer, a model of computation that captures so...
Klaus Sutner
EP
1998
Springer
15 years 9 months ago
An Interface for the Interactive Design of Artistic Screens
This work presents the concepts and the tools involved in the interactive design of artistic screens. The screen elements are derived from a small set of analytical contours provid...
N. Rudaz, Roger D. Hersch, Victor Ostromoukhov
AVI
2000
15 years 6 months ago
VISPS, a Visual System for Plan Specification
In various circumstances, it is possible to arrive at the need to specify sequences of operations that a "machine" has to perform to achieve a purpose. This paper will p...
Marco Porta