Sciweavers

1005 search results - page 112 / 201
» Practical Secure Function Evaluation
Sort
View
DL
1997
Springer
125views Digital Library» more  DL 1997»
14 years 2 months ago
Talking in the Library: Implications for the Design of Digital Libraries
We describe the use of ethnomethodologically-informed ethnography as a means of informing the requirements elicitation, design, development and evaluation of digital libraries. We...
Andy Crabtree, Michael Twidale, Jon O'Brien, David...
ACG
2009
Springer
14 years 2 months ago
Conflict Resolution of Chinese Chess Endgame Knowledge Base
Endgame heuristics are often incorperated as part of the evaluation function used in Chinese chess programs. In our program, Contemplation, we have proposed an automatic strategy t...
Bo-Nian Chen, Pangfeng Liu, Shun-chin Hsu, Tsan-sh...
JMLR
2010
118views more  JMLR 2010»
13 years 4 months ago
Dirichlet Process Mixtures of Generalized Linear Models
We propose Dirichlet Process mixtures of Generalized Linear Models (DP-GLMs), a new method of nonparametric regression that accommodates continuous and categorical inputs, models ...
Lauren Hannah, David M. Blei, Warren B. Powell
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
14 years 4 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
ICFEM
2007
Springer
14 years 4 months ago
Formal Engineering of XACML Access Control Policies in VDM++
We present a formal, tool-supported approach to the design and maintenance of access control policies expressed in the eXtensible Access Control Markup Language (XACML). Our aim is...
Jeremy Bryans, John S. Fitzgerald