Sciweavers

1407 search results - page 161 / 282
» Using Use Cases in Executable Z
Sort
View
STACS
1992
Springer
15 years 8 months ago
Secure Commitment Against A Powerful Adversary
abstract Rafail Ostrovskyy Ramarathnam Venkatesanz Moti Yungx Secure commitment is a primitive enabling information hiding, which is one of the most basic tools in cryptography. S...
Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yun...
CIKM
2008
Springer
15 years 6 months ago
Cross-lingual query classification: a preliminary study
The non-English Web is growing at breakneck speed, but available language processing tools are mostly English based. Taxonomies are a case in point: while there are plenty of comm...
Xuerui Wang, Andrei Z. Broder, Evgeniy Gabrilovich...
CORR
2010
Springer
66views Education» more  CORR 2010»
15 years 4 months ago
Polyominoes Simulating Arbitrary-Neighborhood Zippers and Tilings
This paper provides a bridge between the classical tiling theory and cellular automata on one side, and the complex neighborhood self-assembling situations that exist in practice,...
Lila Kari, Benoît Masson
ECCC
2011
202views ECommerce» more  ECCC 2011»
14 years 11 months ago
New strong direct product results in communication complexity
We show two new direct product results in two different models of communication complexity. Our first result is in the model of one-way public-coin model. Let f ⊆ X × Y × Z ...
Rahul Jain
WSC
2007
15 years 6 months ago
Conceptual modeling of information exchange requirements based on ontological means
Unambiguous definition of the information exchanged between distributed systems is a necessary requirement for simulation system interoperability. The ontological spectrum categor...
Andreas Tolk, Charles D. Turnitsa