Sciweavers

29918 search results - page 5860 / 5984
» A computational model of belief
Sort
View
PET
2007
Springer
15 years 4 months ago
Identity Trail: Covert Surveillance Using DNS
Abstract. The Domain Name System (DNS) is the only globally deployed Internet service that provides user-friendly naming for Internet hosts. It was originally designed to return th...
Saikat Guha, Paul Francis
PRIMA
2007
Springer
15 years 4 months ago
Multiagent Planning with Trembling-Hand Perfect Equilibrium in Multiagent POMDPs
Multiagent Partially Observable Markov Decision Processes are a popular model of multiagent systems with uncertainty. Since the computational cost for finding an optimal joint pol...
Yuichi Yabu, Makoto Yokoo, Atsushi Iwasaki
SCALESPACE
2007
Springer
15 years 4 months ago
New Possibilities with Sobolev Active Contours
Recently, the Sobolev metric was introduced to define gradient flows of various geometric active contour energies. It was shown that the Sobolev metric out-performs the tradition...
Ganesh Sundaramoorthi, Anthony J. Yezzi, Andrea Me...
SEMWEB
2007
Springer
15 years 4 months ago
ASMOV Results for OAEI 2007
Numerous ontology alignment algorithms have appeared in the literature in recent years, but only a few make use of the semantics enclosed within the ontologies in order to improve ...
Yves R. Jean-Mary, Mansur R. Kabuka
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 4 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
« Prev « First page 5860 / 5984 Last » Next »