Sciweavers

1518 search results - page 103 / 304
» Cryptographic Test Correction
Sort
View
113
Voted
AAAI
2008
15 years 6 months ago
Error Classification in Action Descriptions: A Heuristic Approach
Action languages allow to formally represent and reason about actions in a highly declarative manner. In recent work, revision and management of conflicts for domain descriptions ...
Thomas Eiter, Michael Fink, Ján Senko
121
Voted
CCCG
2003
15 years 5 months ago
Computing Delaunay Triangulation with Imprecise Input Data
The key step in the construction of the Delaunay triangulation of a finite set of planar points is to establish correctly whether a given point of this set is inside or outside t...
Ali Asghar Khanban, Abbas Edalat
138
Voted
IJCAI
1993
15 years 5 months ago
Average-Case Analysis of a Nearest Neighbor Algorithm
In this paper we present an average-case analysis of the nearest neighbor algorithm, a simple induction method that has been studied by manyresearchers. Our analysis assumes a con...
Pat Langley, Wayne Iba
134
Voted
COLING
2002
15 years 3 months ago
Looking for Candidate Translational Equivalents in Specialized, Comparable Corpora
Previous attempts at identifying translational equivalents in comparable corpora have dealt with very large `general language' corpora and words. We address this task in a sp...
Yun-Chuang Chiao, Pierre Zweigenbaum
136
Voted
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
15 years 9 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy