Sciweavers

5158 search results - page 161 / 1032
» Generalization of the Dempster-Shafer Theory
Sort
View
OOPSLA
2009
Springer
14 years 2 months ago
Agile anthropology and Alexander's architecture: an essay in three voices
During its formative decades the software community looked twice to the theories of ChristopherAlexander for inspiration, both times failing to completely master the architect’s...
Jenny Quillien, Pam Rostal, Dave West
CSFW
2010
IEEE
14 years 2 months ago
Impossibility Results for Secret Establishment
—Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we exami...
Benedikt Schmidt, Patrick Schaller, David A. Basin
ASIAN
2006
Springer
134views Algorithms» more  ASIAN 2006»
14 years 1 months ago
Computational Soundness of Formal Indistinguishability and Static Equivalence
In the investigation of the relationship between the formal and the computational view of cryptography, a recent approach, first proposed in [10], uses static equivalence from cryp...
Gergei Bana, Payman Mohassel, Till Stegers
IJCAI
1997
13 years 11 months ago
An Aggregation Procedure for Building Episodic Memory
When dealing with narrative texts, a system must possess a strong domain theory, and especially knowledge about situations occurring in the world. Otherwise the system must envisa...
Olivier Ferret, Brigitte Grau
AEI
2008
108views more  AEI 2008»
13 years 10 months ago
Combinatorial synthesis approach employing graph networks
The paper proposes a methodology to assist the designer at the initial stages of the design synthesis process by enabling him/her to employ knowledge and algorithms existing in gr...
Offer Shai, Noel Titus, Karthik Ramani