Sciweavers

4498 search results - page 207 / 900
» How to Invent Functions
Sort
View
ICC
2009
IEEE
155views Communications» more  ICC 2009»
15 years 2 months ago
On Hashing with Tweakable Ciphers
Cryptographic hash functions are often built on block ciphers in order to reduce the security of the hash to that of the cipher, and to minimize the hardware size. Proven secure co...
Raphael Chung-Wei Phan, Jean-Philippe Aumasson
AAMAS
2011
Springer
14 years 11 months ago
Alternatives to truthfulness are hard to recognize
Abstract. The central question in mechanism design is how to implement a given social choice function. One of the most studied concepts is that of truthful implementations in which...
Vincenzo Auletta, Paolo Penna, Giuseppe Persiano, ...
JAIR
2010
130views more  JAIR 2010»
14 years 11 months ago
Interactive Cost Configuration Over Decision Diagrams
In many AI domains such as product configuration, a user should interactively specify a solution that must satisfy a set of constraints. In such scenarios, offline compilation of ...
Henrik Reif Andersen, Tarik Hadzic, David Pisinger
ICASSP
2011
IEEE
14 years 8 months ago
A-Functions: A generalization of Extended Baum-Welch transformations to convex optimization
We introduce the Line Search A-Function (LSAF) technique that generalizes the Extended-Baum Welch technique in order to provide an effective optimization technique for a broader s...
Dimitri Kanevsky, David Nahamoo, Tara N. Sainath, ...
HT
1999
ACM
15 years 8 months ago
Mix'n'match: Exchangeable Modules of Hypermedia Style
Making hypermedia adaptable for multiple forms of presentation involves enabling multiple distinct specifications for how a given collection of hypermedia can have its presentatio...
Lloyd Rutledge, Lynda Hardman, Jacco van Ossenbrug...