Sciweavers

117 search results - page 14 / 24
» A Comparison of Cryptography Courses
Sort
View
CODASPY
2012
12 years 3 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
GECCO
2005
Springer
14 years 26 days ago
Probing for limits to building block mixing with a tunably-difficult problem for genetic programming
This paper describes a tunably-difficult problem for genetic programming (GP) that probes for limits to building block mixing and assembly. The existence of such a problem can be ...
Jason M. Daida, Michael E. Samples, Matthew J. Byo...
ITS
2004
Springer
108views Multimedia» more  ITS 2004»
14 years 23 days ago
Harnessing P2P Power in the Classroom
We have implemented a novel peer-to-peer based environment called Comtella, which allows students to contribute and share class-related resources. This system has been implemented ...
Julita Vassileva
ICAIL
2007
ACM
13 years 11 months ago
Strategic argumentation: a game theoretical investigation
Argumentation is modelled as a game where the payoffs are measured in terms of the probability that the claimed conclusion is, or is not, defeasibly provable, given a history of a...
Bram Roth, Régis Riveret, Antonino Rotolo, ...
KONVENS
2000
13 years 11 months ago
Automatic Labeling of Prosodic Events
An approach for a program is presented that automatically detects the position of pitch accents and intonation phrase (IP) boundaries from waveforms. The technique maps acoustic c...
Norbert Braunschweiler