Sciweavers

915 search results - page 51 / 183
» Maximally Abstract Retrenchments
Sort
View
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 10 months ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
ICDE
2010
IEEE
246views Database» more  ICDE 2010»
14 years 7 months ago
Admission Control Mechanisms for Continuous Queries in the Cloud
Abstract--Amazon, Google, and IBM now sell cloud computing services. We consider the setting of a for-profit business selling data stream monitoring/management services and we inve...
Alexandros Labrinidis, Christine Chung, Kirk Pruhs...
ALT
2009
Springer
14 years 5 months ago
Iterative Learning from Texts and Counterexamples Using Additional Information
Abstract. A variant of iterative learning in the limit (cf. [LZ96]) is studied when a learner gets negative examples refuting conjectures containing data in excess of the target la...
Sanjay Jain, Efim B. Kinber
AI
2009
Springer
14 years 2 months ago
Context Dependent Movie Recommendations Using a Hierarchical Bayesian Model
Abstract. We use a hierarchical Bayesian approach to model user preferences in different contexts or settings. Unlike many previous recommenders, our approach is content-based. We...
Daniel Pomerantz, Gregory Dudek
ICC
2008
IEEE
120views Communications» more  ICC 2008»
14 years 2 months ago
Single-Symbol ML Decodable Precoded DSTBCs for Cooperative Networks
Abstract— Single-Symbol Maximum Likelihood (ML) decodable Distributed Orthogonal Space-Time Block Codes (DOSTBCs) have been introduced recently for cooperative networks and an up...
Jagadeesh Harshan, B. Sundar Rajan