Sciweavers

759 search results - page 120 / 152
» What Can Be Implemented Anonymously
Sort
View
ICALP
2010
Springer
14 years 2 months ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
ICLP
2010
Springer
14 years 1 months ago
Models for Trustworthy Service and Process Oriented Systems
Abstract. Service and process-oriented systems promise to provide more effective business and work processes and more flexible and adaptable enterprise IT systems. However, the t...
Hugo A. López
ICDCS
1995
IEEE
14 years 1 months ago
Specifying Weak Sets
nt formal speci cations of a new abstraction, weak sets, which can be used to alleviate high latencies when retrieving data from a wide-area information system like the World Wide...
Jeannette M. Wing, David C. Steere
ATAL
2010
Springer
13 years 10 months ago
Using answer set programming to model multi-agent scenarios involving agents' knowledge about other's knowledge
One of the most challenging aspects of reasoning, planning, and acting in a multi-agent domain is reasoning about what the agents know about the knowledge of their fellows, and to...
Chitta Baral, Gregory Gelfond, Tran Cao Son, Enric...
BMCBI
2007
165views more  BMCBI 2007»
13 years 10 months ago
Automatic reconstruction of a bacterial regulatory network using Natural Language Processing
Background: Manual curation of biological databases, an expensive and labor-intensive process, is essential for high quality integrated data. In this paper we report the implement...
Carlos Rodríguez Penagos, Heladia Salgado, ...