Sciweavers

1007 search results - page 156 / 202
» The Complexity of Futile Questioning
Sort
View
119
Voted
CIIA
2009
15 years 1 months ago
LCF-style for Secure Verification Platform based on Multiway Decision Graphs
Abstract. Formal verification of digital systems is achieved, today, using one of two main approaches: states exploration (mainly model checking and equivalence checking) or deduct...
Sa'ed Abed, Otmane Aït Mohamed
116
Voted
DEXA
2010
Springer
180views Database» more  DEXA 2010»
15 years 1 months ago
Approximate Instance Retrieval on Ontologies
With the development of more expressive description logics (DLs) for the Web Ontology Language OWL the question arises how we can properly deal with the high computational complexi...
Tuvshintur Tserendorj, Stephan Grimm, Pascal Hitzl...
124
Voted
GRC
2008
IEEE
15 years 1 months ago
Scalar-product based Secure Two-party Computation
—Secure multiparty computation is a very important research topic in cryptography. A secure multi-party computation involves N untrusful parties. It takes input xi from the ith p...
Chih-Hao Shen, Justin Zhan, Tsan-sheng Hsu, Churn-...
85
Voted
AHSWN
2007
86views more  AHSWN 2007»
15 years 24 days ago
On the Robustness of Simple Indoor MANET Simulation Models
— We show that simple radio propagation and node mobility models widely used in MANET evaluation are not robust in indoor environments. Robust simulation models let researchers e...
H. Andrés Lagar-Cavilla, Gerard Baron, Thom...
99
Voted
AIS
2010
Springer
15 years 24 days ago
Anticipation and the artificial: aesthetics, ethics, and synthetic life
If complexity is a necessary but not sufficient premise for the existence and expression of the living, anticipation is the distinguishing characteristic of what is alive. Anticipa...
Mihai Nadin