Sciweavers

CORR
2007
Springer
96views Education» more  CORR 2007»
13 years 7 months ago
Common Beliefs and Public Announcements in Strategic Games with Arbitrary Strategy Sets
We provide an epistemic analysis of arbitrary strategic games based on possibility correspondences. Such an analysis calls for the use of transfinite iterations of the correspond...
Krzysztof R. Apt, Jonathan A. Zvesper
CORR
2007
Springer
105views Education» more  CORR 2007»
13 years 7 months ago
Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder
Francis Klay, Judson Santiago, Laurent Vigneron
CORR
2007
Springer
119views Education» more  CORR 2007»
13 years 7 months ago
Using Description Logics for Recognising Textual Entailment
The aim of this paper is to show how we can handle the Recognising Textual Entailment (RTE) task by using Description Logics (DLs). To do this, we propose a representation of natur...
Paul Bedaride
CORR
2007
Springer
88views Education» more  CORR 2007»
13 years 7 months ago
A generic attack to ciphers
In this paper, we present a generic attack for ciphers, which is in essence a collision attack on the secret keys of ciphers .
An-Ping Li
CORR
2007
Springer
64views Education» more  CORR 2007»
13 years 7 months ago
Generating models for temporal representations
We discuss the use of model building for temporal representations. We chose Polish to illustrate our discussion because it has an interesting aspectual system, but the points we w...
Patrick Blackburn, Sébastien Hinderer
CORR
2007
Springer
109views Education» more  CORR 2007»
13 years 7 months ago
Consistency of trace norm minimization
Regularization by the sum of singular values, also referred to as the trace norm, is a popular technique for estimating low rank rectangular matrices. In this paper, we extend som...
Francis Bach
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 7 months ago
Capacity of Linear Two-hop Mesh Networks with Rate Splitting, Decode-and-forward Relaying and Cooperation
— A linear mesh network is considered in which a single user per cell communicates to a local base station via a dedicated relay (two-hop communication). Exploiting the possibly ...
Osvaldo Simeone, Oren Somekh, Yeheskel Bar-Ness, H...