Sciweavers

886 search results - page 113 / 178
» Generalized Bezout Identity
Sort
View
WPES
2004
ACM
14 years 2 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
ADHOCNOW
2004
Springer
14 years 2 months ago
Consensus with Unknown Participants or Fundamental Self-Organization
Abstract. We consider the problem of bootstrapping self-organized mobile ad hoc networks (MANET), i.e. reliably determining in a distributed and self-organized manner the services ...
David Cavin, Yoav Sasson, André Schiper
CIKM
2004
Springer
14 years 2 months ago
Document clustering based on cluster validation
This paper presents a cluster validation based document clustering algorithm, which is capable of identifying both important feature words and true model order (cluster number). I...
Zheng-Yu Niu, Dong-Hong Ji, Chew Lim Tan
DSMML
2004
Springer
14 years 2 months ago
Transformations of Gaussian Process Priors
Abstract. Gaussian process prior systems generally consist of noisy measurements of samples of the putatively Gaussian process of interest, where the samples serve to constrain the...
Roderick Murray-Smith, Barak A. Pearlmutter
EKAW
2004
Springer
14 years 2 months ago
Semantic Webs for Learning: A Vision and Its Realization
Abstract. Augmenting web pages with semantic contents, i.e., building a ‘Semantic Web’, promises a number of benefits for web users in general and learners in particular. Seman...
Arthur Stutt, Enrico Motta