Sciweavers

189 search results - page 35 / 38
» An optimal generalization of the centerpoint theorem, and it...
Sort
View
FSE
2007
Springer
115views Cryptology» more  FSE 2007»
14 years 2 months ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak
SIGIR
2005
ACM
14 years 1 months ago
Orthogonal locality preserving indexing
We consider the problem of document indexing and representation. Recently, Locality Preserving Indexing (LPI) was proposed for learning a compact document subspace. Different from...
Deng Cai, Xiaofei He
GECCO
2008
Springer
145views Optimization» more  GECCO 2008»
13 years 9 months ago
Memory with memory: soft assignment in genetic programming
Based in part on observations about the incremental nature of most state changes in biological systems, we introduce the idea of Memory with Memory in Genetic Programming (GP), wh...
Nicholas Freitag McPhee, Riccardo Poli
ATAL
2007
Springer
14 years 2 months ago
Meta-level coordination for solving negotiation chains in semi-cooperative multi-agent systems
A negotiation chain is formed when multiple related negotiations are spread over multiple agents. In order to appropriately order and structure the negotiations occurring in the c...
Xiaoqin Zhang, Victor R. Lesser
SIGOPS
2008
306views more  SIGOPS 2008»
13 years 7 months ago
virtio: towards a de-facto standard for virtual I/O devices
The Linux Kernel currently supports at least 8 distinct virtualization systems: Xen, KVM, VMware's VMI, IBM's System p, IBM's System z, User Mode Linux, lguest and ...
Rusty Russell