Sciweavers

2175 search results - page 325 / 435
» From Human Knowledge to Process Models
Sort
View
ECTEL
2007
Springer
15 years 9 months ago
Resolving Variations in Learning Spaces for Experiential Learning
Today, systems should react based on explicit demands from the learner or even proactively react based on changes in the working environment. The success of this type of systems de...
Eric Ras
ECSQARU
2005
Springer
15 years 9 months ago
A Possibilistic Inconsistency Handling in Answer Set Programming
Abstract. Both in classical logic and in Answer Set Programming, inconsistency is characterized by non existence of a model. Whereas every formula is a theorem for inconsistent set...
Pascal Nicolas, Laurent Garcia, Igor Stépha...
CRYPTO
2003
Springer
101views Cryptology» more  CRYPTO 2003»
15 years 8 months ago
The Impact of Decryption Failures on the Security of NTRU Encryption
NTRUEncrypt is unusual among public-key cryptosystems in that, with standard parameters, validly generated ciphertexts can fail to decrypt. This affects the provable security prop...
Nick Howgrave-Graham, Phong Q. Nguyen, David Point...
152
Voted
IWCMC
2010
ACM
15 years 8 months ago
Group detection in mobility traces
—Analysis and modeling of wireless networks greatly depend on understanding the structure of underlying mobile nodes. In this paper we present two clustering algorithms to determ...
Yung-Chih Chen, Elisha J. Rosensweig, Jim Kurose, ...
144
Voted
JIIS
2006
76views more  JIIS 2006»
15 years 3 months ago
Holes in joins
A join of two relations in real databases is usually much smaller than their cartesian product. This means that most of the combinations of tuples in the crossproduct of the respe...
Jarek Gryz, Dongming Liang