Sciweavers

20294 search results - page 123 / 4059
» Algorithmic Information Theory
Sort
View
WPES
2003
ACM
15 years 9 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
JELIA
1994
Springer
15 years 8 months ago
Temporal Theories of Reasoning
: In this paper we describe a general way of formalizing reasoning behaviour. Such a behaviour may be described by all the patterns which are valid for the behaviour. A pattern can...
Joeri Engelfriet, Jan Treur
SIGIR
2010
ACM
15 years 4 months ago
Has portfolio theory got any principles?
Recently, Portfolio Theory (PT) has been proposed for Information Retrieval. However, under non-trivial conditions PT violates the original Probability Ranking Principle (PRP). In...
Guido Zuccon, Leif Azzopardi, Keith van Rijsbergen
ENTCS
2011
99views more  ENTCS 2011»
14 years 11 months ago
Symmetry and Composition in Probabilistic Theories
The past decade has seen a remarkable resurgence of the old programme of finding more or less a priori axioms for the mathematical framework of quantum mechanics. The new impetus...
Alexander Wilce
CIKM
2010
Springer
15 years 3 months ago
Domain-independent entity coreference in RDF graphs
In this paper, we present a novel entity coreference algorithm for Semantic Web instances. The key issues include how to locate context information and how to utilize the context ...
Dezhao Song, Jeff Heflin