Sciweavers

8647 search results - page 1699 / 1730
» The Container Selection Problem
Sort
View
151
Voted
ICISC
2000
126views Cryptology» more  ICISC 2000»
15 years 3 months ago
Cryptographic Applications of Sparse Polynomials over Finite Rings
Abstract. This paper gives new examples that exploit the idea of using sparse polynomials with restricted coefficients over a finite ring for designing fast, reliable cryptosystems...
William D. Banks, Daniel Lieman, Igor Shparlinski,...
ISMB
2000
15 years 3 months ago
An Evaluation of Ontology Exchange Languages for Bioinformatics
Ontologies are specifications of the concepts in a given field, and of the relationships among those concepts. The development of ontologies for molecular-biology information and ...
Robin McEntire, Peter D. Karp, Neil F. Abernethy, ...
123
Voted
WEBNET
1996
15 years 3 months ago
Digital Libraries Based on Full-Text Retrieval
: Because digital libraries are expensive to create and maintain, Internet analogs of public libraries--reliable, quality, community services--have only recently begun to appear. A...
Ian H. Witten, Craig G. Nevill-Manning, Sally Jo C...
93
Voted
IJCAI
1989
15 years 3 months ago
And-Or Graphs Applied to RUE Resolution
In equality-based binary r e s o l u t i o n , the v i a b i l i t y t e s t is used as a decision mechanism to select disagreement sets and also to define the RUE u n i f i e r ....
Vincent J. Digricoli, James J. Lu, V. S. Subrahman...
COLING
1992
15 years 3 months ago
Generating Coherent Argumentative Paragraphs
Q Should I take AI this semester? We address the problem of generating a coherent A If you want to take courses likeparagraph presenting arguments for a conclusion in a Natural La...
Michael Elhadad
« Prev « First page 1699 / 1730 Last » Next »