Sciweavers

7623 search results - page 1176 / 1525
» Constructive Volume Modeling
Sort
View
CSFW
2004
IEEE
15 years 8 months ago
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protocol environ...
Michael Backes, Birgit Pfitzmann
DSN
2004
IEEE
15 years 8 months ago
Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor Networks
In this paper we present a data dissemination protocol for efficiently distributing data through a sensor network in the face of node and link failures. Our work is motivated by t...
Gunjan Khanna, Saurabh Bagchi, Yu-Sung Wu
ECML
2006
Springer
15 years 8 months ago
Cost-Sensitive Learning of SVM for Ranking
Abstract. In this paper, we propose a new method for learning to rank. `Ranking SVM' is a method for performing the task. It formulizes the problem as that of binary classific...
Jun Xu, Yunbo Cao, Hang Li, Yalou Huang
ECTEL
2006
Springer
15 years 8 months ago
Towards Community-Driven Development of Educational Materials: The Edukalibre Approach
Abstract. The libre software development model has shown how combining collective intelligence can lead to revolutionary methods that underpin major software advancements. This pap...
Jesús M. González-Barahona, Vania Di...
ASWEC
2001
IEEE
15 years 8 months ago
Extending the UML for Designing Jack Agents
Mainstreaming and industrialising agent technologies requires suitable methodological and technological support for the various engineering activities associated with managing the...
Michael Papasimeon, Clinton Heinze
« Prev « First page 1176 / 1525 Last » Next »