Sciweavers

4305 search results - page 120 / 861
» Analysing Protocol Implementations
Sort
View
IMC
2010
ACM
13 years 7 months ago
Demystifying service discovery: implementing an internet-wide scanner
This paper develops a high-performance, Internet-wide service discovery tool, which we call IRLscanner, whose main design objectives have been to maximize politeness at remote net...
Derek Leonard, Dmitri Loguinov
LACL
2005
Springer
14 years 2 months ago
Linguistic Facts as Predicates over Ranges of the Sentence
Abstract. This paper introduces a novel approach to language processing, in which linguistic facts are represented as predicates over ranges of the intput text, usually, but not li...
Benoît Sagot
WCE
2007
13 years 10 months ago
A Note on Tornado Diagrams in Interval Decision Analysis
—The research efforts of the DECIDE Research Group have resulted in a decision tool capable of handling imprecise information in complex decision situations. Some of the research...
Jim Idefeldt, Mats Danielson
CORR
2008
Springer
166views Education» more  CORR 2008»
13 years 9 months ago
Information-Theoretically Secure Voting Without an Honest Majority
We present three voting protocols with unconditional privacy and information-theoretic correctness, without assuming any bound on the number of corrupt voters or voting authorities...
Anne Broadbent, Alain Tapp
ICAIL
2005
ACM
14 years 2 months ago
Dialogues about the burden of proof
This paper analyses the phenomenon of a shift of the burden of proof in legal persuasion dialogues. Some sample dialogues are analysed of types of situations where such a shift ma...
Henry Prakken, Chris Reed, Douglas Walton