Sciweavers

503 search results - page 6 / 101
» If not now, when
Sort
View
CSFW
2005
IEEE
14 years 4 months ago
Reconstruction of Attacks against Cryptographic Protocols
We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded ...
Xavier Allamigeon, Bruno Blanchet
CORR
2006
Springer
132views Education» more  CORR 2006»
13 years 10 months ago
Cross-Entropy method: convergence issues for extended implementation
The cross-entropy method (CE) developed by R. Rubinstein is an elegant practical principle for simulating rare events. The method approximates the probability of the rare event by...
Frédéric Dambreville
ICINCO
2004
102views Robotics» more  ICINCO 2004»
13 years 11 months ago
Toward Machines with Emotional Intelligence
For half a century, artificial intelligence researchers have focused on giving machines linguistic and mathematical-logical reasoning abilities, modeled after the classic linguist...
Rosalind W. Picard
ICDE
2008
IEEE
100views Database» more  ICDE 2008»
14 years 11 months ago
OptimAX: efficient support for data-intensive mash-ups
n a node with a b child, and abstract away some details of the AXML notation [3]. A. ActiveXML documents ActiveXML documents are XML documents including some special elements label...
Serge Abiteboul, Ioana Manolescu, Spyros Zoupanos
ICALT
2006
IEEE
14 years 4 months ago
AWELS: Adaptive Web-Based Education and Learning Styles
Can learning styles (LS) be applied in current webbased systems? What are the main issues when applying LS in web-based systems? Can LS be authored in current web-based systems? W...
Alexandra I. Cristea, Natalia Stash