Sciweavers

1045 search results - page 26 / 209
» The Use of Exceptions
Sort
View
CLEIEJ
2010
14 years 7 months ago
Incorporation of Kinesthetic Learning Activities to Computer Science 1 course: Use and Results
In this work, we present the systematic incorporation of Kinesthetic Learning Activities (activities with movements and sensations), into the Computer Science 1 course. We detail ...
Inés Friss de Kereki
MATES
2007
Springer
15 years 3 months ago
Using DESs for Temporal Diagnosis of Multi-agent Plan Execution
The most common reason for plan repair are the violation of a plan’s temporal constraints. Air Traffic Control is an example of an area in which violations of the plan’s tempo...
Femke de Jonge, Nico Roos, Huib Aldewereld
CIS
2004
Springer
15 years 3 months ago
Representation of the Signal Transduction with Aberrance Using Ipi Calculus
The pi calculus has been applied to modelling biochemical networks. In these applications, the modelling is done without considerations to exceptions. The Ipi calculus, the Interfe...
Min Zhang, Guoqiang Li, Yuxi Fu, Zhizhou Zhang, Li...
CRYPTO
1994
Springer
128views Cryptology» more  CRYPTO 1994»
15 years 1 months ago
Linear Cryptanalysis Using Multiple Approximations
We present a technique which aids in the linear cryptanalysis of a block cipher and allows for a reduction in the amount of data required for a successful attack. We note the limit...
Burton S. Kaliski Jr., Matthew J. B. Robshaw
CSFW
1995
IEEE
15 years 1 months ago
Modelling and verifying key-exchange protocols using CSP and FDR
We discuss the issues involved in modelling and verifying key-exchange protocols within the framework of CSP and its model-checking tool FDR. Expressing such protocols within a pr...
A. W. Roscoe