Sciweavers

905 search results - page 93 / 181
» The Case Against Micropayments
Sort
View
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
14 years 9 months ago
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed unde...
Colin Boyd, Juan Manuel González Nieto, M. ...
KDD
2008
ACM
120views Data Mining» more  KDD 2008»
14 years 9 months ago
Multi-class cost-sensitive boosting with p-norm loss functions
We propose a family of novel cost-sensitive boosting methods for multi-class classification by applying the theory of gradient boosting to p-norm based cost functionals. We establ...
Aurelie C. Lozano, Naoki Abe
KDD
2005
ACM
160views Data Mining» more  KDD 2005»
14 years 9 months ago
Optimizing time series discretization for knowledge discovery
Knowledge Discovery in time series usually requires symbolic time series. Many discretization methods that convert numeric time series to symbolic time series ignore the temporal ...
Alfred Ultsch, Fabian Mörchen
CHI
2005
ACM
14 years 9 months ago
Behaviour, realism and immersion in games
Immersion is recognised as an important element of good games. However, it is not always clear what is meant by immersion. Earlier work has identified possible barriers to immersi...
Kevin Cheng, Paul A. Cairns
RECOMB
2007
Springer
14 years 9 months ago
QNet: A Tool for Querying Protein Interaction Networks
Molecular interaction databases can be used to study the evolution of molecular pathways across species. Querying such pathways is a challenging computational problem, and recent e...
Banu Dost, Tomer Shlomi, Nitin Gupta 0002, Eytan R...