Sciweavers

1778 search results - page 230 / 356
» Building a Knowledge Base: An Example
Sort
View
103
Voted
DANCE
2002
IEEE
15 years 5 months ago
Developing Dynamic Security Policies
In this paper we define and provide a general construction for a class of policies we call dynamic policies. In most existing systems, policies are implemented and enforced by ch...
Prasad Naldurg, Roy H. Campbell, M. Dennis Mickuna...
ASIACRYPT
2001
Springer
15 years 5 months ago
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Abstract. Semantic security against chosen-ciphertext attacks (INDCCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is o...
Pierre-Alain Fouque, David Pointcheval
STOC
1998
ACM
139views Algorithms» more  STOC 1998»
15 years 5 months ago
Analysis of Low Density Codes and Improved Designs Using Irregular Graphs
In [6], Gallager introduces a family of codes based on sparse bipartite graphs, which he calls low-density parity-check codes. He suggests a natural decoding algorithm for these c...
Michael Luby, Michael Mitzenmacher, Mohammad Amin ...
NIPS
2004
15 years 2 months ago
Learning Hyper-Features for Visual Identification
We address the problem of identifying specific instances of a class (cars) from a set of images all belonging to that class. Although we cannot build a model for any particular in...
Andras Ferencz, Erik G. Learned-Miller, Jitendra M...
94
Voted
CPHYSICS
2007
138views more  CPHYSICS 2007»
15 years 22 days ago
UPIC: A framework for massively parallel particle-in-cell codes
The UCLA Parallel Particle-in-Cell (UPIC) Framework, is designed to provide trusted components for building a variety of parallel Particle-in-Cell (PIC) codes. It is based on the ...
Viktor K. Decyk