Sciweavers

220 search results - page 19 / 44
» ideal 2005
Sort
View
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
14 years 4 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...
UC
2005
Springer
14 years 4 months ago
A Web-Based P Systems Simulator and Its Parallelization
In this paper we present WebPS, an open-source web-enabled simulator for P systems, and a P accelerator for parallelization of the existing sequential simulators. The simulator is ...
Cosmin Bonchis, Gabriel Ciobanu, Cornel Izbasa, Da...
UM
2005
Springer
14 years 4 months ago
Bayesphone: Precomputation of Context-Sensitive Policies for Inquiry and Action in Mobile Devices
Inference and decision making with probabilistic user models may be infeasible on portable devices such as cell phones. We highlight the opportunity for storing and using precomput...
Eric Horvitz, Paul Koch, Raman Sarin, Johnson Apac...
WEBI
2005
Springer
14 years 4 months ago
Tracking Information Epidemics in Blogspace
Beyond serving as online diaries, weblogs have evolved into a complex social structure, one which is in many ways ideal for the study of the propagation of information. As weblog ...
Eytan Adar, Lada A. Adamic
33
Voted
ACL
2006
14 years 10 days ago
Subword-Based Tagging for Confidence-Dependent Chinese Word Segmentation
We proposed a subword-based tagging for Chinese word segmentation to improve the existing character-based tagging. The subword-based tagging was implemented using the maximum entr...
Ruiqiang Zhang, Gen-ichiro Kikui, Eiichiro Sumita