Sciweavers

3318 search results - page 197 / 664
» The Weak Instance Model
Sort
View
116
Voted
IFIP11
2004
110views Business» more  IFIP11 2004»
15 years 4 months ago
A Security Model for Anonymous Credential Systems
This paper proposes a formal model of the Bellare-Rogaway type [1] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. Th...
Andreas Pashalidis, Chris J. Mitchell
151
Voted
ENTCS
2006
134views more  ENTCS 2006»
15 years 2 months ago
Computing Over-Approximations with Bounded Model Checking
Bounded Model Checking (BMC) searches for counterexamples to a property with a bounded length k. If no such counterexample is found, k is increased. This process terminates when ...
Daniel Kroening
101
Voted
MP
2006
84views more  MP 2006»
15 years 2 months ago
On the behavior of the homogeneous self-dual model for conic convex optimization
Abstract. There is a natural norm associated with a starting point of the homogeneous selfdual (HSD) embedding model for conic convex optimization. In this norm two measures of the...
Robert M. Freund
151
Voted
COLING
2008
15 years 1 months ago
A Probabilistic Model for Measuring Grammaticality and Similarity of Automatically Generated Paraphrases of Predicate Phrases
The most critical issue in generating and recognizing paraphrases is development of wide-coverage paraphrase knowledge. Previous work on paraphrase acquisition has collected lexic...
Atsushi Fujita, Satoshi Sato
130
Voted
ECIR
2011
Springer
14 years 6 months ago
Learning Models for Ranking Aggregates
Aggregate ranking tasks are those where documents are not the final ranking outcome, but instead an intermediary component. For instance, in expert search, a ranking of candidate ...
Craig Macdonald, Iadh Ounis