Sciweavers

4305 search results - page 120 / 861
» Analysing Protocol Implementations
Sort
View
IMC
2010
ACM
15 years 11 days ago
Demystifying service discovery: implementing an internet-wide scanner
This paper develops a high-performance, Internet-wide service discovery tool, which we call IRLscanner, whose main design objectives have been to maximize politeness at remote net...
Derek Leonard, Dmitri Loguinov
LACL
2005
Springer
15 years 8 months ago
Linguistic Facts as Predicates over Ranges of the Sentence
Abstract. This paper introduces a novel approach to language processing, in which linguistic facts are represented as predicates over ranges of the intput text, usually, but not li...
Benoît Sagot
WCE
2007
15 years 3 months ago
A Note on Tornado Diagrams in Interval Decision Analysis
—The research efforts of the DECIDE Research Group have resulted in a decision tool capable of handling imprecise information in complex decision situations. Some of the research...
Jim Idefeldt, Mats Danielson
CORR
2008
Springer
166views Education» more  CORR 2008»
15 years 2 months ago
Information-Theoretically Secure Voting Without an Honest Majority
We present three voting protocols with unconditional privacy and information-theoretic correctness, without assuming any bound on the number of corrupt voters or voting authorities...
Anne Broadbent, Alain Tapp
ICAIL
2005
ACM
15 years 8 months ago
Dialogues about the burden of proof
This paper analyses the phenomenon of a shift of the burden of proof in legal persuasion dialogues. Some sample dialogues are analysed of types of situations where such a shift ma...
Henry Prakken, Chris Reed, Douglas Walton