Sciweavers

747 search results - page 123 / 150
» Consequence Relations In DRT
Sort
View
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
HICSS
2003
IEEE
116views Biometrics» more  HICSS 2003»
14 years 1 months ago
Modeling Instrumental Conditioning - The Behavioral Regulation Approach
Basically, instrumental conditioning is learning through consequences: Behavior that produces positive results (high “instrumental response”) is reinforced, and that which pro...
Jose J. Gonzalez, Agata Sawicka
ICDM
2002
IEEE
138views Data Mining» more  ICDM 2002»
14 years 20 days ago
Extraction Techniques for Mining Services from Web Sources
The Web has established itself as the dominant medium for doing electronic commerce. Consequently the number of service providers, both large and small, advertising their services...
Hasan Davulcu, Saikat Mukherjee, I. V. Ramakrishna...
COMPGEOM
1994
ACM
13 years 11 months ago
Computing Envelopes in Four Dimensions with Applications
Let F be a collection of n d-variate, possibly partially defined, functions, all algebraic of some constant maximum degree. We present a randomized algorithm that computes the vert...
Pankaj K. Agarwal, Boris Aronov, Micha Sharir
DLOG
2007
13 years 10 months ago
Retrospective on Clio: Schema Mapping and Data Exchange in Practice
Clio is a joint research project between the University of Toronto and IBM Almaden Research Center started in 1999 to address both foundational and systems issues related to the ma...
Renée J. Miller