Sciweavers

1757 search results - page 350 / 352
» Alternating Refinement Relations
Sort
View
SDM
2011
SIAM
232views Data Mining» more  SDM 2011»
13 years 16 days ago
A Sequential Dual Method for Structural SVMs
In many real world prediction problems the output is a structured object like a sequence or a tree or a graph. Such problems range from natural language processing to computationa...
Shirish Krishnaj Shevade, Balamurugan P., S. Sunda...
ASIACRYPT
2011
Springer
12 years 9 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
12 years 9 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
EDM
2011
197views Data Mining» more  EDM 2011»
12 years 9 months ago
Towards Improvements on Domain-independent Measurements for Collaborative Assessment
Assessment on collaborative student behavior is a longstanding issue in user modeling. Nowadays thanks to the proliferation of online learning and the vast amount of data on studen...
Antonio R. Anaya, Jesus Boticario
AAMAS
2012
Springer
12 years 5 months ago
Using argumentation to model agent decision making in economic experiments
In this paper we demonstrate how a qualitative framework for decision making can be used to model scenarios from experimental economic studies and we show how our approach explains...
Trevor J. M. Bench-Capon, Katie Atkinson, Peter Mc...