Sciweavers

1025 search results - page 75 / 205
» Improved Behaviour of Tries by the
Sort
View
89
Voted
ASIACRYPT
2004
Springer
15 years 7 months ago
On Provably Secure Time-Stamping Schemes
Abstract. It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the underlying hash function is collisionresistant but still no rigorous proofs have...
Ahto Buldas, Märt Saarepera
CIS
2004
Springer
15 years 7 months ago
Automatic Segmentation Technique Without User Modification for 3D Visualization in Medical Images
Abstract. It is necessary to analyze an image from CT or MR and then to segment an image of a certain organ from that of other tissues for 3D (ThreeDimensional) visualization. Ther...
Won Seong, Eui-Jeong Kim, Jong-Won Park
139
Voted
IAT
2003
IEEE
15 years 7 months ago
Asymmetric Multiagent Reinforcement Learning
A gradient-based method for both symmetric and asymmetric multiagent reinforcement learning is introduced in this paper. Symmetric multiagent reinforcement learning addresses the ...
Ville Könönen
IWPC
2003
IEEE
15 years 7 months ago
Towards a Clone Detection Benchmark Suite and Results Archive
Source code clones are copies or near-copies of other portions of code, often created by copying and pasting portions of source code. This working session is concerned with buildi...
Arun Lakhotia, Junwei Li, Andrew Walenstein, Yun Y...
UIST
2003
ACM
15 years 7 months ago
A molecular architecture for creating advanced GUIs
This paper presents a new GUI architecture for creating advanced interfaces. This model is based on a limited set of general principles that improve flexibility and provide capabi...
Eric Lecolinet