Sciweavers

2206 search results - page 420 / 442
» On the power of coercion abstraction
Sort
View
USENIX
2004
13 years 9 months ago
REX: Secure, Extensible Remote Execution
The ubiquitous SSH package has demonstrated the importance of secure remote login and execution. As remote execution tools grow in popularity, users require new features and exten...
Michael Kaminsky, Eric Peterson, Daniel B. Giffin,...
MLMTA
2003
13 years 9 months ago
Using a Two-Layered Case-Based Reasoning for Prediction in Soccer Coach
Abstract— The prediction of the future states in MultiAgent Systems has been a challenging problem since the begining of MAS. Robotic soccer is a MAS environment in which the pre...
Mazda Ahmadi, Abolfazl Keighobadi Lamjiri, Mayssam...
ICISC
2000
126views Cryptology» more  ICISC 2000»
13 years 9 months ago
Cryptographic Applications of Sparse Polynomials over Finite Rings
Abstract. This paper gives new examples that exploit the idea of using sparse polynomials with restricted coefficients over a finite ring for designing fast, reliable cryptosystems...
William D. Banks, Daniel Lieman, Igor Shparlinski,...
WSC
2000
13 years 9 months ago
An integrated object model for activity network based simulation
This paper describes an object-orientated simulation approach towards an integrated planning of production systems. The main obstacle for an integrated use of simulation over diff...
Gert Zülch, Jörg Fischer, Uwe Jonsson
ANLP
1994
103views more  ANLP 1994»
13 years 9 months ago
Exploiting Sophisticated Representations for Document Retrieval
The use of NLP techniques for document classification has not produced significant improvements in performance within the standard term weighting statistical assignment paradigm (...
Steven Finch