Sciweavers

205 search results - page 31 / 41
» Theory and applications for a double-base number system
Sort
View
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
14 years 1 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
ATAL
2006
Springer
14 years 21 days ago
How equitable is rational negotiation?
Notions of fairness have recently received increased attention in the context of resource allocation problems, pushed by diverse applications where not only pure utilitarian effic...
Sylvia Estivie, Yann Chevaleyre, Ulle Endriss, Nic...
ALIFE
2006
13 years 9 months ago
Axiomatic Scalable Neurocontroller Analysis via the Shapley Value
One of the major challenges in the field of neurally driven evolved autonomous agents is deciphering the neural mechanisms underlying their behavior. Aiming at this goal, we have d...
Alon Keinan, Ben Sandbank, Claus C. Hilgetag, Isaa...
AI
2002
Springer
13 years 8 months ago
Learning Bayesian networks from data: An information-theory based approach
This paper provides algorithms that use an information-theoretic analysis to learn Bayesian network structures from data. Based on our three-phase learning framework, we develop e...
Jie Cheng, Russell Greiner, Jonathan Kelly, David ...
PODC
2012
ACM
11 years 11 months ago
Byzantine broadcast in point-to-point networks using local linear coding
The goal of Byzantine Broadcast (BB) is to allow a set of fault-free nodes to agree on information that a source node wants to broadcast to them, in the presence of Byzantine faul...
Guanfeng Liang, Nitin H. Vaidya