Sciweavers

271 search results - page 27 / 55
» Equal To The Task
Sort
View
TCC
2009
Springer
133views Cryptology» more  TCC 2009»
14 years 8 months ago
Composing Quantum Protocols in a Classical Environment
We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple q...
Serge Fehr, Christian Schaffner
MOMPES
2009
IEEE
14 years 2 months ago
ArcheOpterix: An extendable tool for architecture optimization of AADL models
For embedded systems quality requirements are equally if not even more important than functional requirements. The foundation for the fulfillment of these quality requirements ha...
Aldeida Aleti, Stefan Björnander, Lars Grunsk...
CIG
2006
IEEE
14 years 1 months ago
Exploiting Sensor Symmetries in Example-based Training for Intelligent Agents
— Intelligent agents in games and simulators often operate in environments subject to symmetric transformations that produce new but equally legitimate environments, such as re...
Bobby D. Bryant, Risto Miikkulainen
KES
2004
Springer
14 years 29 days ago
comDesk: A Cooperative Assistance Tool Based on P2P Techniques
We have designed and implemented a desktop sharing system based on P2P (peer-to-peer) techniques, named “comDesk,” which enables users to exchange the desktop images as well as...
Motoki Miura, Buntarou Shizuki, Jiro Tanaka
LREC
2008
154views Education» more  LREC 2008»
13 years 9 months ago
A Comparative Evaluation of Term Recognition Algorithms
Automatic Term recognition (ATR) is a fundamental processing step preceding more complex tasks such as semantic search and ontology learning. From a large number of methodologies ...
Ziqi Zhang, José Iria, Christopher Brewster...