Sciweavers

4332 search results - page 622 / 867
» A Probabilistic Identification Result
Sort
View
137
Voted
EJC
2006
15 years 4 months ago
Counting connected graphs asymptotically
We find the asymptotic number of connected graphs with k vertices and k - 1 + l edges when k, l approach infinity, reproving a result of Bender, Canfield and McKay. We use the pro...
Remco van der Hofstad, Joel Spencer
ENTCS
2006
145views more  ENTCS 2006»
15 years 4 months ago
Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes
INFFUS
2008
97views more  INFFUS 2008»
15 years 4 months ago
Using classifier ensembles to label spatially disjoint data
act 11 We describe an ensemble approach to learning from arbitrarily partitioned data. The partitioning comes from the distributed process12 ing requirements of a large scale simul...
Larry Shoemaker, Robert E. Banfield, Lawrence O. H...
IPM
2008
92views more  IPM 2008»
15 years 4 months ago
Searching strategies for the Hungarian language
This paper reports on the underlying IR problems encountered when dealing with the complex morphology and compound constructions found in the Hungarian language. It describes evalu...
Jacques Savoy
CORR
2007
Springer
162views Education» more  CORR 2007»
15 years 4 months ago
Exploiting Social Annotation for Automatic Resource Discovery
Information integration applications, such as mediators or mashups, that require access to information resources currently rely on users manually discovering and integrating them ...
Anon Plangprasopchok, Kristina Lerman