Sciweavers

745 search results - page 66 / 149
» The origins of combinatorics on words
Sort
View
IWANN
2009
Springer
15 years 6 months ago
Lower Bounds for Approximation of Some Classes of Lebesgue Measurable Functions by Sigmoidal Neural Networks
We propose a general method for estimating the distance between a compact subspace K of the space L1 ([0, 1]s ) of Lebesgue measurable functions defined on the hypercube [0, 1]s ,...
José Luis Montaña, Cruz E. Borges
IPPS
2000
IEEE
15 years 6 months ago
Parallel Maximum-Likelihood Inversion for Estimating Wavenumber-Ordered Spectra in Emission Spectroscopy
We introduce a parallelization of the maximumlikelihood cosine transform. This transform consists of a computationally intensive iterative fitting process, but is readily decompo...
Hoda El-Sayed, Marc Salit, John Travis, Judith Ell...
118
Voted
POPL
2000
ACM
15 years 6 months ago
Transforming Out Timing Leaks
It has been shown that secret information can be leaked to external observers through covert timing channels. In this paper we are concerned with a kind of timing attack that want...
Johan Agat
ADBIS
1999
Springer
109views Database» more  ADBIS 1999»
15 years 6 months ago
Workflow Management System Using Mobile Agents
Abstract. In [1, 8] we proposed a complete design of a workflow management system using mobile agents. The proposed solution was highly distributed and almost without centralized ...
Zoran Budimac, Mirjana Ivanovic, Aleksandar Popovi...
CARDIS
1998
Springer
161views Hardware» more  CARDIS 1998»
15 years 6 months ago
Formal Proof of Smart Card Applets Correctness
: The new Gemplus smart card is based on the Java technology, embedding a virtual machine. The security policy uses mechanisms that are based on Java properties. This language prov...
Jean-Louis Lanet, Antoine Requet