Sciweavers

339 search results - page 57 / 68
» Abstracting Interactions Based on Message Sets
Sort
View
FC
2007
Springer
118views Cryptology» more  FC 2007»
14 years 27 days ago
K-Anonymous Multi-party Secret Handshakes
Abstract. Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, aut...
Shouhuai Xu, Moti Yung
CEC
2005
IEEE
14 years 10 days ago
Sensorimotor experience and its metrics: informational geometry and the temporal horizon
Abstract- We introduce metrics on sensorimotor experience at various temporal scales based on informationtheory. Sensorimotor variables through which the experience of an agent fl...
Chrystopher L. Nehaniv
BMCBI
2007
165views more  BMCBI 2007»
13 years 6 months ago
Automatic reconstruction of a bacterial regulatory network using Natural Language Processing
Background: Manual curation of biological databases, an expensive and labor-intensive process, is essential for high quality integrated data. In this paper we report the implement...
Carlos Rodríguez Penagos, Heladia Salgado, ...
ICLP
2010
Springer
13 years 10 months ago
Models for Trustworthy Service and Process Oriented Systems
Abstract. Service and process-oriented systems promise to provide more effective business and work processes and more flexible and adaptable enterprise IT systems. However, the t...
Hugo A. López
CN
2006
61views more  CN 2006»
13 years 6 months ago
Structuring topologically aware overlay networks using domain names
Abstract-- Overlay networks are application layer systems which facilitate users in performing distributed functions such as searches over the contents of other users. An important...
Demetrios Zeinalipour-Yazti, Vana Kalogeraki