Sciweavers

522 search results - page 63 / 105
» Necessary but Not Sufficient
Sort
View
CRYPTO
2008
Springer
120views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
The Random Oracle Model and the Ideal Cipher Model Are Equivalent
The Random Oracle Model and the Ideal Cipher Model are two well known idealised models of computation for proving the security of cryptosystems. At Crypto 2005, Coron et al. showed...
Jean-Sébastien Coron, Jacques Patarin, Yann...
COMAD
2008
13 years 9 months ago
Towards the Preservation of Keys in XML Data Transformation for Integration
Transformation of a source schema with its conforming data to a target schema with its conforming data is an important activity in XML as two schemas in XML can represent same rea...
Md. Sumon Shahriar
LREC
2010
158views Education» more  LREC 2010»
13 years 9 months ago
Human Judgements on Causation in French Texts
The annotation of causal relations in natural language texts can lead to a low inter-annotator agreement. A French corpus annotated with causal relations would be helpful for the ...
Cécile Grivaz
DAGSTUHL
2004
13 years 9 months ago
Information-Based Nonlinear Approximation: An Average Case Setting
Nonlinear approximation has usually been studied under deterministic assumptions and complete information about the underlying functions. In the present paper we assume only partia...
Leszek Plaskota
AAAI
1990
13 years 8 months ago
Negotiation and Conflict Resolution in Non-Cooperative Domains
In previous work [Zlotkin and Rosenschein, 1989a], we have developed a negotiation protocol and offered some negotiation strategies that are in equilibrium. This negotiation proce...
Gilad Zlotkin, Jeffrey S. Rosenschein