Sciweavers

30 search results - page 4 / 6
» Intrusion-Resilient Key Exchange in the Bounded Retrieval Mo...
Sort
View
NCA
2002
IEEE
13 years 7 months ago
The Construction of Smooth Models using Irregular Embeddings Determined by a Gamma Test Analysis
One of the key problems in forming a smooth model from input-output data is the determination of which input variables are relevant in predicting a given output. In this paper we ...
Alban P. M. Tsui, Antonia J. Jones, A. Guedes de O...
IJMSO
2008
135views more  IJMSO 2008»
13 years 7 months ago
An argumentation framework based on confidence degrees to combine ontology mapping approaches
: Ontology mapping has a key importance for applications such as information retrieval, database integration, and agent-communication. This paper presents an Argumentation Framewor...
Cássia Trojahn dos Santos, Paulo Quaresma, ...
PE
2007
Springer
140views Optimization» more  PE 2007»
13 years 7 months ago
Stochastic analysis of file-swarming systems
File swarming (or file sharing) is one of the most important applications in P2P networks. In this paper, we propose a stochastic framework to analyze a file swarming system und...
Minghong Lin, Bin Fan, John C. S. Lui, Dah-Ming Ch...
BMCBI
2010
122views more  BMCBI 2010»
13 years 7 months ago
An overview of the CellML API and its implementation
Background: CellML is an XML based language for representing mathematical models, in a machine-independent form which is suitable for their exchange between different authors, and...
Andrew K. Miller, Justin Marsh, Adam Reeve, Alan G...
FOCS
2004
IEEE
13 years 11 months ago
Shuffling by Semi-Random Transpositions
In the cyclic-to-random shuffle, we are given n cards arranged in a circle. At step k, we exchange the k'th card along the circle with a uniformly chosen random card. The pro...
Elchanan Mossel, Yuval Peres, Alistair Sinclair