Sciweavers

997 search results - page 177 / 200
» Completely Lazy Learning
Sort
View
EUROCRYPT
2003
Springer
14 years 3 months ago
Two-Threshold Broadcast and Detectable Multi-party Computation
Classical distributed protocols like broadcast or multi-party computation provide security as long as the number of malicious players f is bounded by some given threshold t, i.e., ...
Matthias Fitzi, Martin Hirt, Thomas Holenstein, J&...
ROBOCUP
1999
Springer
129views Robotics» more  ROBOCUP 1999»
14 years 2 months ago
The Ulm Sparrows 99
In RoboCup-98, sparrows team worked hard just to get both a simulation and a middle size robot team to work and to successfully participate in a major tournament. For this year, we...
Stefan Sablatnög, Stefan Enderle, Mark Dettin...
ITICSE
1997
ACM
14 years 2 months ago
Computer managed, open question, open book assessment
This paper describes the development and use of practical examinations which include a significant element of software control of the administrative process. The educational metho...
John Rosbottom
KDD
2010
ACM
235views Data Mining» more  KDD 2010»
14 years 1 months ago
New perspectives and methods in link prediction
This paper examines important factors for link prediction in networks and provides a general, high-performance framework for the prediction task. Link prediction in sparse network...
Ryan Lichtenwalter, Jake T. Lussier, Nitesh V. Cha...
EELC
2006
125views Languages» more  EELC 2006»
14 years 1 months ago
How Do Children Develop Syntactic Representations from What They Hear?
nstructional schemas, both specific and abstract. Children are thought to start out with concrete pieces of language and to gradually develop more schematic constructions. All cons...
Elena Lieven