Sciweavers

2016 search results - page 269 / 404
» Megamaps: Construction and Examples
Sort
View
ATAL
2005
Springer
15 years 10 months ago
Fencing the Open Fields: Empirical Concerns on Electronic Institutions (Invited Paper)
The regulation of multiagent systems may be approached from different stand-points. In this paper I will take the perspective of using a certain type of devices, electronic instit...
Pablo Noriega
BIRTHDAY
2005
Springer
15 years 10 months ago
Psychological Validity of Schematic Proofs
Schematic proofs are functions which can produce a proof of a proposition for each value of their parameters. A schematic proof can be constructed by abstracting a general pattern ...
Mateja Jamnik, Alan Bundy
COCO
2005
Springer
77views Algorithms» more  COCO 2005»
15 years 10 months ago
On the Sensitivity of Cyclically-Invariant Boolean Functions
In this paper we construct a cyclically invariant Boolean function whose sensitivity is Θ(n1/3 ). This result answers two previously published questions. Tur´an (1984) asked if ...
Sourav Chakraborty
COLT
2005
Springer
15 years 10 months ago
Learning Convex Combinations of Continuously Parameterized Basic Kernels
We study the problem of learning a kernel which minimizes a regularization error functional such as that used in regularization networks or support vector machines. We consider thi...
Andreas Argyriou, Charles A. Micchelli, Massimilia...
CRYPTO
2005
Springer
135views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
We describe two new public key broadcast encryption systems for stateless receivers. Both systems are fully secure against any number of colluders. In our first construction both...
Dan Boneh, Craig Gentry, Brent Waters