Sciweavers

4714 search results - page 228 / 943
» The Complexity of Iterated Multiplication
Sort
View
SEMWEB
2004
Springer
15 years 10 months ago
Working with Multiple Ontologies on the Semantic Web
The standardization of the second generation Web Ontology Language, OWL, leaves a crucial issue for Web-based ontologies unsatisfactorily resolved: how to represent and reason with...
Bernardo Cuenca Grau, Bijan Parsia, Evren Sirin
145
Voted
GLVLSI
2003
IEEE
140views VLSI» more  GLVLSI 2003»
15 years 10 months ago
Exploiting multiple functionality for nano-scale reconfigurable systems
It is likely that it will become increasingly difficult to manufacture the complex, heterogeneous logic structures that characterise current reconfigurable logic systems. As a res...
Paul Beckett
162
Voted
ROBOCUP
1998
Springer
156views Robotics» more  ROBOCUP 1998»
15 years 9 months ago
Cooperative Behavior Acquisition in a Multiple Mobile Robot Environment by Co-evolution
Co-evolution has been receiving increased attention as a method for multi agent simultaneous learning. This paper discusses how multiple robots can emerge cooperative behaviors thr...
Eiji Uchibe, Masateru Nakamura, Minoru Asada
MICRO
1994
IEEE
96views Hardware» more  MICRO 1994»
15 years 9 months ago
A fill-unit approach to multiple instruction issue
Multiple issue of instructions occurs in superscalar and VLIW machines. This paper investigates a third type of machine design, which combines the advantages of code compatibility...
Manoj Franklin, Mark Smotherman
CISC
2007
Springer
108views Cryptology» more  CISC 2007»
15 years 9 months ago
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where e...
Christophe Tartary, Josef Pieprzyk, Huaxiong Wang