Sciweavers

117 search results - page 14 / 24
» A Comparison of Cryptography Courses
Sort
View
CODASPY
2012
13 years 5 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
89
Voted
GECCO
2005
Springer
15 years 3 months ago
Probing for limits to building block mixing with a tunably-difficult problem for genetic programming
This paper describes a tunably-difficult problem for genetic programming (GP) that probes for limits to building block mixing and assembly. The existence of such a problem can be ...
Jason M. Daida, Michael E. Samples, Matthew J. Byo...
ITS
2004
Springer
108views Multimedia» more  ITS 2004»
15 years 3 months ago
Harnessing P2P Power in the Classroom
We have implemented a novel peer-to-peer based environment called Comtella, which allows students to contribute and share class-related resources. This system has been implemented ...
Julita Vassileva
ICAIL
2007
ACM
15 years 1 months ago
Strategic argumentation: a game theoretical investigation
Argumentation is modelled as a game where the payoffs are measured in terms of the probability that the claimed conclusion is, or is not, defeasibly provable, given a history of a...
Bram Roth, Régis Riveret, Antonino Rotolo, ...
KONVENS
2000
15 years 1 months ago
Automatic Labeling of Prosodic Events
An approach for a program is presented that automatically detects the position of pitch accents and intonation phrase (IP) boundaries from waveforms. The technique maps acoustic c...
Norbert Braunschweiler