Sciweavers

813 search results - page 147 / 163
» Pipeline-centric provenance model
Sort
View
IIE
2007
105views more  IIE 2007»
13 years 7 months ago
Student-Centered Support Systems to Sustain Logo-Like Learning
Conventional wisdom attributes the lack of effective technology use in classrooms to a shortage of professional development or poorly run professional development. At the same time...
Sylvia Martinez
SIMPRA
2008
106views more  SIMPRA 2008»
13 years 7 months ago
CEST and MEST: Tools for the simulation of radio frequency electric discharges in waveguides
In this paper we present two software tools for the simulation of electron multiplication processes in radio frequency (RF) waveguides. The electric discharges are caused by the m...
Francisco Pérez, Juan de Lara, Luis Conde, ...
ANSOFT
2002
126views more  ANSOFT 2002»
13 years 7 months ago
The Real-Time Process Algebra (RTPA)
Abstract. The real-time process algebra (RTPA) is a set of new mathematical notations for formally describing system architectures, and static and dynamic behaviors. It is recogniz...
Yingxu Wang
JOC
2010
124views more  JOC 2010»
13 years 6 months ago
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
We present a new encryption scheme which is secure against adaptive chosenciphertext attack (or CCA2-secure) in the standard model (i.e. without the use of random oracle). Our sch...
Yvo Desmedt, Rosario Gennaro, Kaoru Kurosawa, Vict...
TSP
2010
13 years 2 months ago
Distributed learning in multi-armed bandit with multiple players
We formulate and study a decentralized multi-armed bandit (MAB) problem. There are distributed players competing for independent arms. Each arm, when played, offers i.i.d. reward a...
Keqin Liu, Qing Zhao