Sciweavers

642 search results - page 81 / 129
» corr 2006
Sort
View
84
Voted
CORR
2006
Springer
105views Education» more  CORR 2006»
15 years 18 days ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
83
Voted
CORR
2006
Springer
101views Education» more  CORR 2006»
15 years 18 days ago
Foundations of Modern Language Resource Archives
A number of serious reasons will convince an increasing amount of researchers to store their relevant material in centers which we will call "language resource archives"...
Peter Wittenburg, Daan Broeder, Wolfgang Klein, St...
CORR
2006
Springer
88views Education» more  CORR 2006»
15 years 18 days ago
Both Generic Design and Different Forms of Designing
Abstract. This paper defends an augmented cognitively oriented "genericdesign hypothesis": There are both significant similarities between the design activities implement...
Willemien Visser
CORR
2006
Springer
116views Education» more  CORR 2006»
15 years 18 days ago
Memory Aware High-Level Synthesis for Embedded Systems
We introduce a new approach to take into account the memory architecture and the memory mapping in the High- Level Synthesis of Real-Time embedded systems. We formalize the memory...
Gwenolé Corre, Eric Senn, Nathalie Julien, ...
CORR
2007
Springer
169views Education» more  CORR 2007»
15 years 17 days ago
Algorithmic Complexity Bounds on Future Prediction Errors
We bound the future loss when predicting any (computably) stochastic sequence online. Solomonoff finitely bounded the total deviation of his universal predictor M from the true d...
Alexey V. Chernov, Marcus Hutter, Jürgen Schm...