Sciweavers

7623 search results - page 1161 / 1525
» Constructive Volume Modeling
Sort
View
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
15 years 10 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
ATAL
2005
Springer
15 years 10 months ago
Formalizing and achieving multiparty agreements via commitments
Multiparty agreements often arise in a multiagent system where autonomous agents interact with each other to achieve a global goal. Multiparty agreements are traditionally represe...
Feng Wan, Munindar P. Singh
BIRTHDAY
2005
Springer
15 years 10 months ago
Objective Bayesian Nets
I present a formalism that combines two methodologies: objective Bayesianism and Bayesian nets. According to objective Bayesianism, an agent’s degrees of belief (i) ought to sat...
Jon Williamson
111
Voted
CIKM
2005
Springer
15 years 10 months ago
Joint deduplication of multiple record types in relational data
Record deduplication is the task of merging database records that refer to the same underlying entity. In relational databases, accurate deduplication for records of one type is o...
Aron Culotta, Andrew McCallum
140
Voted
EMO
2005
Springer
107views Optimization» more  EMO 2005»
15 years 10 months ago
Multiobjective Water Pinch Analysis of the Cuernavaca City Water Distribution Network
Water systems often allow efficient water uses via water reuse and/or recirculation. Defining the network layout connecting water-using processes is a complex problem which involv...
Carlos E. Mariano-Romero, Víctor Alcocer-Ya...
« Prev « First page 1161 / 1525 Last » Next »