Sciweavers

678 search results - page 87 / 136
» The Theory of Weak Stabilization
Sort
View
107
Voted
PKC
1999
Springer
83views Cryptology» more  PKC 1999»
15 years 4 months ago
On the Security of Random Sources
Abstract. Many applications rely on the security of their random number generator. It is therefore essential that such devices be extensively tested for malfunction. The purpose of...
Jean-Sébastien Coron
94
Voted
LICS
1990
IEEE
15 years 4 months ago
Normal Process Representatives
This paper discusses the relevance of a form of cut elimination theorem for linear logic tensor theories to the concept of a process on a Petri net. We base our discussion on two ...
Vijay Gehlot, Carl A. Gunter
COMPGEOM
2007
ACM
15 years 4 months ago
An optimal generalization of the centerpoint theorem, and its extensions
We prove an optimal generalization of the centerpoint theorem: given a set P of n points in the plane, there exist two points (not necessarily among input points) that hit all con...
Saurabh Ray, Nabil H. Mustafa
IAT
2009
IEEE
15 years 4 months ago
Efficient Distributed Bayesian Reasoning via Targeted Instantiation of Variables
Abstract--This paper is focusing on exact Bayesian reasoning in systems of agents, which represent weakly coupled processing modules supporting collaborative inference through mess...
Patrick de Oude, Gregor Pavlin
124
Voted
VL
1991
IEEE
183views Visual Languages» more  VL 1991»
15 years 4 months ago
The Conceptual Programming Environment, CP: Reasoning Representation using Graph Structures and Operations
The Conceptual Programming environment, CP, being developed at the Computing Research Laboratory (CRL), is a complete knowledge representation visual programming environment for u...
Heather Pfeiffer, Roger T. Hartley