Sciweavers

2092 search results - page 369 / 419
» A Theory of Non-Deterministic Networks
Sort
View
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 1 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
DEBS
2010
ACM
15 years 5 days ago
Complex event processing synergies with predictive analytics
For Complex Event Processing (CEP), the synergy with Predictive Analytics (PA) is a promising research direction. In this paper we focus on the inclusion of PA technologies into C...
Gabriella Toth, Lajos Jeno Fülöp, L&aacu...
CAE
2007
15 years 5 days ago
A Poetics of Simulation for Audiovisual Performance
Audiovisual performance is a fertile area for creative expression, an intersection of experimental cinema and computer music that has seen a groundswell of interest in recent year...
Randy Jones
AAAI
2007
15 years 2 days ago
Towards Large Scale Argumentation Support on the Semantic Web
This paper lays theoretical and software foundations for a World Wide Argument Web (WWAW): a large-scale Web of inter-connected arguments posted by individuals to express their op...
Iyad Rahwan, Fouad Zablith, Chris Reed
BMEI
2008
IEEE
14 years 11 months ago
Clustering of High-Dimensional Gene Expression Data with Feature Filtering Methods and Diffusion Maps
The importance of gene expression data in cancer diagnosis and treatment by now has been widely recognized by cancer researchers in recent years. However, one of the major challen...
Rui Xu, Steven Damelin, Boaz Nadler, Donald C. Wun...