Sciweavers

3052 search results - page 188 / 611
» Weakly Distributive Domains
Sort
View
COMPSEC
2006
98views more  COMPSEC 2006»
15 years 4 months ago
A Secure Identification and Key agreement protocol with user Anonymity (SIKA)
Anonymity is a desirable security feature in addition to providing user identification and key agreement during a user's login process. Recently, Yang et al., proposed an eff...
Kumar V. Mangipudi, Rajendra S. Katti
MOR
2006
60views more  MOR 2006»
15 years 4 months ago
Measure-Valued Differentiation for Stationary Markov Chains
: We study general state-space Markov chains that depend on a parameter, say, . Sufficient conditions are established for the stationary performance of such a Markov chain to be di...
Bernd Heidergott, Arie Hordijk, Heinz Weisshaupt
COGSCI
2002
108views more  COGSCI 2002»
15 years 4 months ago
Statistical models for the induction and use of selectional preferences
Selectional preferences have a long history in both generative and computational linguistics. However, since the publication of Resnik's dissertation in 1993, a new approach ...
Marc Light, Warren R. Greiff
CPC
2002
80views more  CPC 2002»
15 years 4 months ago
The Wiener Index Of Random Trees
The Wiener index is analyzed for random recursive trees and random binary search trees in the uniform probabilistic models. We obtain the expectations, asymptotics for the varianc...
Ralph Neininger
SIAMNUM
2010
114views more  SIAMNUM 2010»
14 years 11 months ago
Computing Multivariate Fekete and Leja Points by Numerical Linear Algebra
We discuss and compare two greedy algorithms, that compute discrete versions of Fekete-like points for multivariate compact sets by basic tools of numerical linear algebra. The fi...
Len Bos, Stefano De Marchi, Alvise Sommariva, Marc...