Sciweavers

1520 search results - page 290 / 304
» Class Hierarchy Specialization
Sort
View
WISA
2004
Springer
14 years 29 days ago
Hyperelliptic Curve Coprocessors on a FPGA
Abstract. Cryptographic algorithms are used in a large variety of different applications to ensure security services. It is, thus, very interesting to investigate various implement...
Howon Kim, Thomas J. Wollinger, YongJe Choi, Kyoil...
IDEAS
2003
IEEE
122views Database» more  IDEAS 2003»
14 years 28 days ago
Preferred Repairs for Inconsistent Databases
The objective of this paper is to investigate the problems related to the extensional integration of information sources. In particular, we propose an approach for managing incons...
Sergio Greco, Cristina Sirangelo, Irina Trubitsyna...
SIGECOM
2003
ACM
122views ECommerce» more  SIGECOM 2003»
14 years 27 days ago
On polynomial-time preference elicitation with value queries
Preference elicitation — the process of asking queries to determine parties’ preferences — is a key part of many problems in electronic commerce. For example, a shopping age...
Martin Zinkevich, Avrim Blum, Tuomas Sandholm
SPAA
2003
ACM
14 years 26 days ago
Short length menger's theorem and reliable optical routing
In the minimum path coloring problem, we are given a graph and a set of pairs of vertices of the graph and we are asked to connect the pairs by colored paths in such a way that pa...
Amitabha Bagchi, Amitabh Chaudhary, Petr Kolman
AMKM
2003
Springer
14 years 26 days ago
Towards Agent-Mediated Knowledge Management
Abstract. In this paper, we outline the relation between Knowledge Management (KM) as an application area on the one hand, and software agents as a basic technology for supporting ...
Ludger van Elst, Virginia Dignum, Andreas Abecker