Sciweavers

3778 search results - page 213 / 756
» Erdos-Ko-Rado for three sets
Sort
View
140
Voted
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
15 years 10 months ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
DIAGRAMS
2004
Springer
15 years 10 months ago
Decision Diagrams in Machine Learning: An Empirical Study on Real-Life Credit-Risk Data
Decision trees are a widely used knowledge representation in machine learning. However, one of their main drawbacks is the inherent replication of isomorphic subtrees, as a result...
Christophe Mues, Bart Baesens, Craig M. Files, Jan...
181
Voted
ILP
2004
Springer
15 years 10 months ago
Learning an Approximation to Inductive Logic Programming Clause Evaluation
One challenge faced by many Inductive Logic Programming (ILP) systems is poor scalability to problems with large search spaces and many examples. Randomized search methods such as ...
Frank DiMaio, Jude W. Shavlik
140
Voted
MICCAI
2004
Springer
15 years 10 months ago
Registration-Based Interpolation Using a High-Resolution Image for Guidance
A method is presented for interpolation between neighbouring slices in a grey-scale tomographic data set, when a high-resolution image of the same patient is also available. Spatia...
Graeme P. Penney, Julia A. Schnabel, Daniel Ruecke...
PPSN
2004
Springer
15 years 10 months ago
Dominance Based Crossover Operator for Evolutionary Multi-objective Algorithms
In spite of the recent quick growth of the Evolutionary Multi-objective Optimization (EMO) research field, there has been few trials to adapt the general variation operators to t...
Olga Rudenko, Marc Schoenauer