Sciweavers

1516 search results - page 38 / 304
» Generalizing Indexical-Functional Reference
Sort
View
IDTRUST
2010
ACM
14 years 3 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
TCBB
2008
120views more  TCBB 2008»
13 years 8 months ago
Learning Scoring Schemes for Sequence Alignment from Partial Examples
When aligning biological sequences, the choice of scoring scheme is critical. Even small changes in gap penalties, for example, can yield radically different alignments. A rigorous...
Eagu Kim, John D. Kececioglu
IJRR
2002
96views more  IJRR 2002»
13 years 8 months ago
Phase Regulation of Decentralized Cyclic Robotic Systems
We address the problem of coupling cyclic robotic tasks to produce a specified coordinated behavior. Such coordination tasks are common in robotics, appearing in applications like...
Eric Klavins, Daniel E. Koditschek
P2P
2005
IEEE
14 years 2 months ago
Finding Rare Data Objects in P2P File-Sharing Systems
Peer-to-peer file-sharing systems have hundreds of thousands of users sharing petabytes of data, however, their search functionality is limited. In general, query results contain...
Wai Gen Yee, Dongmei Jia, Ophir Frieder
DOCENG
2003
ACM
14 years 1 months ago
Management of trusted citations
We discuss how references and citations within a document to particular sources can be verified and guaranteed. When a document refers through a quotation to another document, th...
Christer Fernström