Sciweavers

1375 search results - page 29 / 275
» eg 2006
Sort
View
IJIS
2006
44views more  IJIS 2006»
13 years 8 months ago
Optimal choice of granularity in commonsense estimation: Why half-orders of magnitude?
It has been observed that when people make crude estimates, they feel comfortable choosing between alternatives which differ by a half-order of magnitude (e.g., were there 100, 30...
Jerry R. Hobbs, Vladik Kreinovich
IJISEC
2006
108views more  IJISEC 2006»
13 years 8 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
IJMSO
2006
105views more  IJMSO 2006»
13 years 8 months ago
Trust network-based filtering of aggregated claims
: On the semantic web, assertions may be aggregated from many sources, those aggregations filtered, reasoned over, aggregated with other aggregators, displayed, scraped, extracted,...
Jennifer Golbeck, Bijan Parsia
IJNSEC
2006
69views more  IJNSEC 2006»
13 years 8 months ago
Active Trial-and-error Attack on SASC Protocols
SASC (Server-Aided Secret Computation) protocols enable a client (a smart card) to borrow computing power from a server (e.g., an untrustworthy auxiliary device like an ATM) witho...
Heeyoul Kim, Younho Lee, Seong-Min Hong, Hyunsoo Y...
JAIR
2006
106views more  JAIR 2006»
13 years 8 months ago
Clause/Term Resolution and Learning in the Evaluation of Quantified Boolean Formulas
Resolution is the rule of inference at the basis of most procedures for automated reasoning. In these procedures, the input formula is first translated into an equisatisfiable for...
Enrico Giunchiglia, Massimo Narizzano, Armando Tac...