Sciweavers

30 search results - page 4 / 6
» Intrusion-Resilient Key Exchange in the Bounded Retrieval Mo...
Sort
View
NCA
2002
IEEE
14 years 9 months ago
The Construction of Smooth Models using Irregular Embeddings Determined by a Gamma Test Analysis
One of the key problems in forming a smooth model from input-output data is the determination of which input variables are relevant in predicting a given output. In this paper we ...
Alban P. M. Tsui, Antonia J. Jones, A. Guedes de O...
74
Voted
IJMSO
2008
135views more  IJMSO 2008»
14 years 9 months ago
An argumentation framework based on confidence degrees to combine ontology mapping approaches
: Ontology mapping has a key importance for applications such as information retrieval, database integration, and agent-communication. This paper presents an Argumentation Framewor...
Cássia Trojahn dos Santos, Paulo Quaresma, ...
PE
2007
Springer
140views Optimization» more  PE 2007»
14 years 9 months ago
Stochastic analysis of file-swarming systems
File swarming (or file sharing) is one of the most important applications in P2P networks. In this paper, we propose a stochastic framework to analyze a file swarming system und...
Minghong Lin, Bin Fan, John C. S. Lui, Dah-Ming Ch...
BMCBI
2010
122views more  BMCBI 2010»
14 years 9 months ago
An overview of the CellML API and its implementation
Background: CellML is an XML based language for representing mathematical models, in a machine-independent form which is suitable for their exchange between different authors, and...
Andrew K. Miller, Justin Marsh, Adam Reeve, Alan G...
FOCS
2004
IEEE
15 years 1 months ago
Shuffling by Semi-Random Transpositions
In the cyclic-to-random shuffle, we are given n cards arranged in a circle. At step k, we exchange the k'th card along the circle with a uniformly chosen random card. The pro...
Elchanan Mossel, Yuval Peres, Alistair Sinclair