Sciweavers

3155 search results - page 150 / 631
» How Are You Doing
Sort
View
ACSC
2006
IEEE
14 years 2 months ago
On pedagogically sound examples in public-key cryptography
Pencil-and-paper exercises in public-key cryptography are important in learning the subject. It is desirable that a student doing such an exercise does not get the right answer by...
Suan Khai Chong, Graham Farr, Laura Frost, Simon H...
AUIC
2006
IEEE
14 years 2 months ago
A case for iconic icons
User interface designers still have to rely on personal creativity and skill when designing computer icons for program functions that have no existing conventional representation....
Jennifer Ferreira, James Noble, Robert Biddle
ATAL
2005
Springer
14 years 1 months ago
Global convergence of local agent behaviors
Many multi-agent systems seek to reconcile two apparently inconsistent constraints. The system’s overall objective is defined at a global level. However, the agents have only lo...
H. Van Dyke Parunak, Sven Brueckner, John A. Saute...
ISI
2005
Springer
14 years 1 months ago
Link Analysis Tools for Intelligence and Counterterrorism
Association rule mining is an important data analysis tool that can be applied with success to a variety of domains. However, most association rule mining algorithms seek to discov...
Antonio Badia, Mehmed M. Kantardzic
ISIPTA
2003
IEEE
14 years 1 months ago
Graphical Representation of Asymmetric Graphoid Structures
Independence models induced by some uncertainty measures (e.g. conditional probability, possibility) do not obey the usual graphoid properties, since they do not satisfy the symme...
Barbara Vantaggi