Sciweavers

130 search results - page 24 / 26
» How to Encrypt with a Malicious Random Number Generator
Sort
View
SYNTHESE
2010
99views more  SYNTHESE 2010»
13 years 3 months ago
The epistemology of science - a bird's-eye view
In this paper I outline my conception of the epistemology of science, by reference to my published papers, showing how the ideas presented there fit together. In particular I disc...
Alexander Bird
CVPR
2010
IEEE
14 years 2 months ago
ARISTA - Image Search to Annotation on Billions of Web Photos
Though it has cost great research efforts for decades, object recognition is still a challenging problem. Traditional methods based on machine learning or computer vision are stil...
Xin-Jing Wang, Ming Liu, Lei Zhang, Yi Li, Wei-Yin...
IWLCS
2001
Springer
14 years 1 months ago
Explorations in LCS Models of Stock Trading
In previous papers we have described the basic elements for building an economic model consisting of a group of artificial traders functioning and adapting in an environment conta...
Sonia Schulenburg, Peter Ross
COCO
2006
Springer
93views Algorithms» more  COCO 2006»
14 years 13 days ago
Making Hard Problems Harder
We consider a general approach to the hoary problem of (im)proving circuit lower bounds. We define notions of hardness condensing and hardness extraction, in analogy to the corres...
Joshua Buresh-Oppenheim, Rahul Santhanam
BMCBI
2006
84views more  BMCBI 2006»
13 years 8 months ago
Inferring topology from clustering coefficients in protein-protein interaction networks
Background: Although protein-protein interaction networks determined with high-throughput methods are incomplete, they are commonly used to infer the topology of the complete inte...
Caroline C. Friedel, Ralf Zimmer