Sciweavers

682 search results - page 56 / 137
» Classifying arguments by scheme
Sort
View
KDD
1998
ACM
442views Data Mining» more  KDD 1998»
15 years 2 months ago
BAYDA: Software for Bayesian Classification and Feature Selection
BAYDA is a software package for flexible data analysis in predictive data mining tasks. The mathematical model underlying the program is based on a simple Bayesian network, the Na...
Petri Kontkanen, Petri Myllymäki, Tomi Siland...
LOGCOM
2007
84views more  LOGCOM 2007»
14 years 9 months ago
A Sharp Phase Transition Threshold for Elementary Descent Recursive Functions
Harvey Friedman introduced natural independence results for the Peano axioms via certain schemes of combinatorial well-foundedness. We consider here parameterized versions of this...
Arnoud den Boer, Andreas Weiermann
ESOP
2009
Springer
15 years 4 months ago
Practical Variable-Arity Polymorphism
Just as some functions have uniform behavior over distinct types, other functions have uniform behavior over distinct arities. These variable-arity functions are widely used in scr...
T. Stephen Strickland, Sam Tobin-Hochstadt, Matthi...
SPAA
2006
ACM
15 years 3 months ago
On space-stretch trade-offs: lower bounds
One of the fundamental trade-offs in compact routing schemes is between the space used to store the routing table on each node and the stretch factor of the routing scheme – th...
Ittai Abraham, Cyril Gavoille, Dahlia Malkhi
PKC
1998
Springer
107views Cryptology» more  PKC 1998»
15 years 2 months ago
On the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven bas...
Yiannis Tsiounis, Moti Yung