Sciweavers

725 search results - page 79 / 145
» Descriptive Set Theory of Families of Small Sets
Sort
View
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
14 years 1 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
KDD
2000
ACM
153views Data Mining» more  KDD 2000»
15 years 1 months ago
The generalized Bayesian committee machine
In this paper we introduce the Generalized Bayesian Committee Machine (GBCM) for applications with large data sets. In particular, the GBCM can be used in the context of kernel ba...
Volker Tresp
WWW
2007
ACM
15 years 10 months ago
GigaHash: scalable minimal perfect hashing for billions of urls
A minimal perfect function maps a static set of keys on to the range of integers {0,1,2, ... , - 1}. We present a scalable high performance algorithm based on random graphs for ...
Kumar Chellapilla, Anton Mityagin, Denis Xavier Ch...
CADE
2005
Springer
15 years 10 months ago
An Algorithm for Deciding BAPA: Boolean Algebra with Presburger Arithmetic
We describe an algorithm for deciding the first-order multisorted theory BAPA, which combines 1) Boolean algebras of sets of uninterpreted elements (BA) and 2) Presburger arithmeti...
Viktor Kuncak, Huu Hai Nguyen, Martin C. Rinard
OTM
2005
Springer
15 years 3 months ago
A Meta-ontological Architecture for Foundational Ontologies
Abstract. In this paper we present and discuss a meta-ontological archifor ontologies which centers on abstract core ontologies (ACOs). s the most abstract part of a foundational o...
Heinrich Herre, Frank Loebe