Sciweavers

3128 search results - page 295 / 626
» Finite element method
Sort
View
INFOCOM
2012
IEEE
14 years 2 months ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
AI
2009
Springer
15 years 11 months ago
Automatic Frame Extraction from Sentences
We present a method for automatic extraction of frames from .a dependency graph. Our method uses machine learning applied to a dependency tree to assign frames and assign frame ele...
Martin Scaiano, Diana Inkpen
OOIS
2001
Springer
15 years 9 months ago
Reconciliation of Object Interaction Models
: This paper presents Reconciliation+, a tool-supported method which identifies overlaps between models of different object interactions expressed as UML sequence and/or collaborat...
George Spanoudakis, Hyoseob Kim
127
Voted
SACRYPT
2001
Springer
130views Cryptology» more  SACRYPT 2001»
15 years 9 months ago
Algorithms for Multi-exponentiation
This paper compares different approaches for computing power products 1≤i≤k gei i in finite groups. We look at the conventional simultaneous exponentiation approach and prese...
Bodo Möller
IJCAI
2003
15 years 6 months ago
A Planning Algorithm for Predictive State Representations
We address the problem of optimally controlling stochastic environments that are partially observable. The standard method for tackling such problems is to define and solve a Part...
Masoumeh T. Izadi, Doina Precup