Sciweavers

1466 search results - page 275 / 294
» ABL: Alignment-Based Learning
Sort
View
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
14 years 4 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
ICST
2009
IEEE
14 years 4 months ago
Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles
It is challenging to test applications and functions for which the correct output for arbitrary input cannot be known in advance, e.g. some computational science or machine learni...
Christian Murphy, Kuang Shen, Gail E. Kaiser
ACG
2009
Springer
14 years 4 months ago
Monte-Carlo Tree Search in Settlers of Catan
Abstract. Games are considered important benchmark tasks of artificial intelligence research. Modern strategic board games can typically be played by three or more people, which m...
Istvan Szita, Guillaume Chaslot, Pieter Spronck
WAIM
2009
Springer
14 years 4 months ago
Personalized Delivery of On-Line Search Advertisement Based on User Interests
Search engine advertising has become the main stream of online advertising system. In current search engine advertising systems, all users will get the same advertisement rank if t...
Guangyi Xiao, Zhiguo Gong
UM
2009
Springer
14 years 4 months ago
Narcissus: Group and Individual Models to Support Small Group Work
Long term group work by small teams is a central part of many learning and workplace activities. Widespread group support tools such as wikis, version control systems and issue tra...
Kimberley Upton, Judy Kay