Sciweavers

206 search results - page 7 / 42
» Sharing in the Weak Lambda-Calculus
Sort
View
ICMLA
2010
13 years 6 months ago
Boosting Multi-Task Weak Learners with Applications to Textual and Social Data
Abstract--Learning multiple related tasks from data simultaneously can improve predictive performance relative to learning these tasks independently. In this paper we propose a nov...
Jean Baptiste Faddoul, Boris Chidlovskii, Fabien T...
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
14 years 9 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
ICDCS
1996
IEEE
14 years 20 days ago
The Relative Importance of Concurrent Writers and Weak Consistency Models
This paper presents a detailed comparison of the relative importance of allowing concurrent writers versus the choice of the underlying consistency model. Our comparison is based ...
Peter J. Keleher
CONCUR
1994
Springer
14 years 19 days ago
Weak Sequential Composition in Process Algebras
Abstract. In this paper we study a special operator for sequential composition, which is de ned relative to a dependency relation over the actions of a given system. The idea is th...
Arend Rensink, Heike Wehrheim
ICEIS
2003
IEEE
14 years 1 months ago
Storage of Complex Business Rules in Object Databases
: True integration of large systems requires sharing of information stored in databases beyond sharing of pure data: business rules associated with this data must be shared also. T...
Dalen Kambur, Mark Roantree