Sciweavers

1458 search results - page 86 / 292
» The sequentially realizable functionals
Sort
View
GECCO
2004
Springer
15 years 9 months ago
A Caching Genetic Algorithm for Spectral Breakpoint Matching
Abstract. Two methods were evaluated for performing spectral breakpoint matching: a multi-level pruned exhaustive search and a genetic algorithm. The GA found matches about as good...
Jonathan Mohr, Xiaobo Li
156
Voted
LICS
1992
IEEE
15 years 7 months ago
Compiler Verification in LF
We sketch a methodology for the verification of compiler correctness based on the LF Logical Framework as realized within the Elf programming language. We have applied this techni...
John Hannan, Frank Pfenning
109
Voted
CSR
2006
Springer
15 years 7 months ago
Logic of Proofs for Bounded Arithmetic
The logic of proofs is known to be complete for the semantics of proofs in PA. In this paper we present a refinement of this theorem, we will show that we can assure that all the ...
Evan Goris
CPHYSICS
2006
46views more  CPHYSICS 2006»
15 years 3 months ago
A second-order finite volume scheme for three dimensional truncated pyramidal quantum dot
Three dimensional truncated pyramidal quantum dots are simulated numerically to compute the energy states and the wave functions. The simulation of the heterostructures is realize...
Weichung Wang, Tsung-Min Hwang, Jia-Chuan Jang
129
Voted
SCN
2008
Springer
128views Communications» more  SCN 2008»
15 years 3 months ago
On Linear Secret Sharing for Connectivity in Directed Graphs
In this work we study linear secret sharing schemes for s-t connectivity in directed graphs. In such schemes the parties are edges of a complete directed graph, and a set of partie...
Amos Beimel, Anat Paskin