Sciweavers

334 search results - page 43 / 67
» trust 2010
Sort
View
GECCO
2010
Springer
225views Optimization» more  GECCO 2010»
13 years 10 months ago
Comparison of NEWUOA with different numbers of interpolation points on the BBOB noiseless testbed
In this paper, we study the performances of the NEW Unconstrained Optimization Algorithm (NEWUOA) with different numbers of interpolation points. NEWUOA is a trust region method, ...
Raymond Ros
CORR
2010
Springer
64views Education» more  CORR 2010»
13 years 10 months ago
A Trustability Metric for Code Search based on Developer Karma
The promise of search-driven development is that developers will save time and resources by reusing external code in their local projects. To efficiently integrate this code, user...
Florian S. Gysin, Adrian Kuhn
IJISEC
2010
87views more  IJISEC 2010»
13 years 8 months ago
How to construct identity-based signatures without the key escrow problem
The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by a...
Tsz Hon Yuen, Willy Susilo, Yi Mu
JAIR
2010
158views more  JAIR 2010»
13 years 8 months ago
A Survey of Paraphrasing and Textual Entailment Methods
Paraphrasing methods recognize, generate, or extract phrases, sentences, or longer natural language expressions that convey almost the same information. Textual entailment methods...
Ion Androutsopoulos, Prodromos Malakasiotis
SUTC
2010
IEEE
13 years 8 months ago
User-Based Attestation for Trustworthy Visual Sensor Networks
Abstract—Camera networks are used for a variety of applications including surveillance, traffic monitoring or elderly care. The shift from analog towards fully digitized systems...
Thomas Winkler, Bernhard Rinner