Sciweavers

5275 search results - page 999 / 1055
» Computing by observing
Sort
View
CCS
2005
ACM
15 years 5 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
CIKM
2005
Springer
15 years 5 months ago
Maximal termsets as a query structuring mechanism
Search engines process queries conjunctively to restrict the size of the answer set. Further, it is not rare to observe a mismatch between the vocabulary used in the text of Web p...
Bruno Pôssas, Nivio Ziviani, Berthier A. Rib...
COCO
2005
Springer
99views Algorithms» more  COCO 2005»
15 years 5 months ago
On the Complexity of Succinct Zero-Sum Games
We study the complexity of solving succinct zero-sum games, i.e., the games whose payoff matrix M is given implicitly by a Boolean circuit C such that M(i, j) = C(i, j). We comple...
Lance Fortnow, Russell Impagliazzo, Valentine Kaba...
ECAL
2005
Springer
15 years 5 months ago
A Self-organising, Self-adaptable Cellular System
Abstract. Inspired by the recent advances in evolutionary biology, we have developed a self-organising, self-adaptable cellular system for multitask learning. The main aim of our p...
Lucien Epiney, Mariusz Nowostawski
EUC
2005
Springer
15 years 5 months ago
Asymmetry-Aware Link Quality Services in Wireless Sensor Networks
Recent studies in wireless sensor networks (WSN) have observed that the irregular link quality is a common phenomenon, rather than an anomaly. The irregular link quality, especiall...
Junzhao Du, Weisong Shi, Kewei Sha