Sciweavers

1343 search results - page 247 / 269
» Learning to Complete Sentences
Sort
View
EUROCRYPT
2004
Springer
15 years 8 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
EUROCRYPT
2003
Springer
15 years 8 months ago
Two-Threshold Broadcast and Detectable Multi-party Computation
Classical distributed protocols like broadcast or multi-party computation provide security as long as the number of malicious players f is bounded by some given threshold t, i.e., ...
Matthias Fitzi, Martin Hirt, Thomas Holenstein, J&...
ROBOCUP
1999
Springer
129views Robotics» more  ROBOCUP 1999»
15 years 7 months ago
The Ulm Sparrows 99
In RoboCup-98, sparrows team worked hard just to get both a simulation and a middle size robot team to work and to successfully participate in a major tournament. For this year, we...
Stefan Sablatnög, Stefan Enderle, Mark Dettin...
ITICSE
1997
ACM
15 years 7 months ago
Computer managed, open question, open book assessment
This paper describes the development and use of practical examinations which include a significant element of software control of the administrative process. The educational metho...
John Rosbottom
KDD
2010
ACM
235views Data Mining» more  KDD 2010»
15 years 7 months ago
New perspectives and methods in link prediction
This paper examines important factors for link prediction in networks and provides a general, high-performance framework for the prediction task. Link prediction in sparse network...
Ryan Lichtenwalter, Jake T. Lussier, Nitesh V. Cha...