Sciweavers

1005 search results - page 196 / 201
» Practical Secure Function Evaluation
Sort
View
ICC
2008
IEEE
14 years 2 months ago
GORA: Goodput Optimal Rate Adaptation for 802.11 Using Medium Status Estimation
Abstract—Rate Adaptation for 802.11 has been deeply investigated in the past, but the problem of achieving optimal Rate Adaptation with respect not only to channel-related errors...
Nicola Baldo, Federico Maguolo, Simone Merlin, And...
MICRO
2007
IEEE
137views Hardware» more  MICRO 2007»
14 years 1 months ago
Implementing Signatures for Transactional Memory
Transactional Memory (TM) systems must track the read and write sets—items read and written during a transaction—to detect conflicts among concurrent transactions. Several TM...
Daniel Sanchez, Luke Yen, Mark D. Hill, Karthikeya...
AIHC
2007
Springer
14 years 1 months ago
Affect Detection and an Automated Improvisational AI Actor in E-Drama
Enabling machines to understand emotions and feelings of the human users in their natural language textual input during interaction is a challenging issue in Human Computing. Our w...
Li Zhang, Marco Gillies, John A. Barnden, Robert J...
ECSQARU
2007
Springer
14 years 1 months ago
Towards an Extensible Argumentation System
Many types of inter-agent dialogue, including information seeking, negotiation and deliberation can be fruitfully seen as varieties of argumentation. Argumentation frameworks, ori...
Adam Zachary Wyner, Trevor J. M. Bench-Capon
ICDM
2006
IEEE
166views Data Mining» more  ICDM 2006»
14 years 1 months ago
Mining Generalized Graph Patterns Based on User Examples
There has been a lot of recent interest in mining patterns from graphs. Often, the exact structure of the patterns of interest is not known. This happens, for example, when molecu...
Pavel Dmitriev, Carl Lagoze