Sciweavers

583 search results - page 56 / 117
» More Reflections on
Sort
View
ESORICS
2008
Springer
13 years 11 months ago
Improved Security Notions and Protocols for Non-transferable Identification
Abstract. Different security notions and settings for identification protocols have been proposed so far, considering different powerful adversaries that can play "man-in-the-...
Carlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadegh...
CCCG
2006
13 years 11 months ago
Polygons Flip Finitely: Flaws and a Fix
Every simple planar polygon can undergo only a finite number of pocket flips before becoming convex. Since Erdos posed this as an open problem in 1935, several independent purport...
Erik D. Demaine, Blaise Gassend, Joseph O'Rourke, ...
ICDM
2009
IEEE
167views Data Mining» more  ICDM 2009»
13 years 7 months ago
Self-Adaptive Anytime Stream Clustering
Clustering streaming data requires algorithms which are capable of updating clustering results for the incoming data. As data is constantly arriving, time for processing is limited...
Philipp Kranen, Ira Assent, Corinna Baldauf, Thoma...
AAAI
2000
13 years 11 months ago
Redundancy in Random SAT Formulas
The random k-SAT model is extensively used to compare satisfiability algorithms or to find the best settings for the parameters of some algorithm. Conclusions are derived from the...
Yacine Boufkhad, Olivier Roussel
CE
2007
81views more  CE 2007»
13 years 10 months ago
Aptitude-treatment interactions in preservice teachers' behavior change during computer-simulated teaching
Adapting training methods to specific teacher traits to best facilitate the training effects for preservice teachers is an important, yet neglected, topic in aptitude-treatment in...
Yu-Chu Yeh