Sciweavers

7200 search results - page 1193 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
14 years 2 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
WEBDB
2000
Springer
136views Database» more  WEBDB 2000»
14 years 2 months ago
An Optimization Technique for Answering Regular Path Queries
Rewriting queries using views is a powerful technique that has applications in data integration, data warehousing and query optimization. Query rewriting in relational databases i...
Gösta Grahne, Alex Thomo
KDD
1995
ACM
108views Data Mining» more  KDD 1995»
14 years 2 months ago
A Statistical Perspective On Knowledge Discovery In Databases
The quest to nd models usefully characterizing data is a process central to the scienti c method, and has been carried out on many fronts. Researchers from an expanding number of ...
John F. Elder IV, Daryl Pregibon
STOC
1995
ACM
107views Algorithms» more  STOC 1995»
14 years 2 months ago
Incremental cryptography and application to virus protection
The goal of incremental cryptography is to design cryptographic algorithms with the property that having applied the algorithm to a document, it is possible to quickly update the ...
Mihir Bellare, Oded Goldreich, Shafi Goldwasser
ECAIW
1994
Springer
14 years 2 months ago
Representing and Executing Agent-Based Systems
Abstract. In this paper we describe an approach to the representation and implementation of agent-based systems where the behaviour of an individual agent is represented by a set o...
Michael Fisher
« Prev « First page 1193 / 1440 Last » Next »