Sciweavers

24680 search results - page 4786 / 4936
» Learning
Sort
View
ICCD
2000
IEEE
119views Hardware» more  ICCD 2000»
14 years 22 days ago
Source-Level Transformations for Improved Formal Verification
A major obstacle to widespread acceptance of formal verification is the difficulty in using the tools effectively. Although learning the basic syntax and operation of a formal ver...
Brian D. Winters, Alan J. Hu
KDD
2000
ACM
153views Data Mining» more  KDD 2000»
14 years 22 days ago
The generalized Bayesian committee machine
In this paper we introduce the Generalized Bayesian Committee Machine (GBCM) for applications with large data sets. In particular, the GBCM can be used in the context of kernel ba...
Volker Tresp
KR
2000
Springer
14 years 22 days ago
Approximate Objects and Approximate Theories
We propose to extend the ontology of logical AI to include approximate objects, approximate predicates and approximate theories. Besides the ontology we treat the relations among ...
John McCarthy
EUROCRYPT
1997
Springer
14 years 22 days ago
Oblivious Transfers and Privacy Amplification
Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-two string OT, a sender offers two strings, one of which the other party, called the receive...
Gilles Brassard, Claude Crépeau
SIGUCCS
2000
ACM
14 years 21 days ago
On the Road to Becoming a Statewide ISP
This paper discusses the technical and policy issues that West Virginia Network (WVNET) encountered when it expanded its statewide Internet dialup service through an outsourcing p...
Roman Olynyk
« Prev « First page 4786 / 4936 Last » Next »