Sciweavers

886 search results - page 40 / 178
» Generalized Bezout Identity
Sort
View
DIGRA
2005
Springer
14 years 2 months ago
Addressing social dilemmas and fostering cooperation through computer games
The concept of social dilemmas can be used to understand social situations all around us. I am looking at identity formation to help understand why people make the decisions they ...
Mark Chen
SIGIR
2004
ACM
14 years 2 months ago
Document clustering via adaptive subspace iteration
Document clustering has long been an important problem in information retrieval. In this paper, we present a new clustering algorithm ASI1, which uses explicitly modeling of the s...
Tao Li, Sheng Ma, Mitsunori Ogihara
CSB
2003
IEEE
14 years 2 months ago
A Probabilistic Model for Identifying Protein Names and their Name Boundaries
This paper proposes a method for identifying protein names in biomedical texts with an emphasis on detecting protein name boundaries. We use a probabilistic model which exploits s...
Kazuhiro Seki, Javed Mostafa
CCS
2003
ACM
14 years 2 months ago
Receiver anonymity via incomparable public keys
We describe a new method for protecting the anonymity of message receivers in an untrusted network. Surprisingly, existing methods fail to provide the required level of anonymity ...
Brent R. Waters, Edward W. Felten, Amit Sahai
IDTRUST
2010
ACM
14 years 2 months ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch