Sciweavers

3274 search results - page 525 / 655
» Access Support in Object Bases
Sort
View
TCS
2008
15 years 4 months ago
New constructions for provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each ...
Alfredo De Santis, Anna Lisa Ferrara, Barbara Masu...
CORR
2002
Springer
104views Education» more  CORR 2002»
15 years 4 months ago
Design Patterns for Functional Strategic Programming
We believe that design patterns can be an effective means of consolidating and communicating program construction expertise for functional programming, just as they have proven to...
Ralf Lämmel, Joost Visser
JAIR
2000
131views more  JAIR 2000»
15 years 4 months ago
An Application of Reinforcement Learning to Dialogue Strategy Selection in a Spoken Dialogue System for Email
This paper describes a novel method by which a spoken dialogue system can learn to choose an optimal dialogue strategy from its experience interacting with human users. The method...
Marilyn A. Walker
JCSC
2002
87views more  JCSC 2002»
15 years 4 months ago
Power Estimator Development for Embedded System Memory Tuning
Memory accesses account for a large percentage of total power in microprocessor-based embedded systems. The increasing use of microprocessor cores and synthesis, rather than prefa...
Frank Vahid, Tony Givargis, Susan Cotterell
ML
2007
ACM
144views Machine Learning» more  ML 2007»
15 years 3 months ago
Invariant kernel functions for pattern analysis and machine learning
In many learning problems prior knowledge about pattern variations can be formalized and beneficially incorporated into the analysis system. The corresponding notion of invarianc...
Bernard Haasdonk, Hans Burkhardt