Sciweavers

4698 search results - page 291 / 940
» Making Functionality More General
Sort
View
TCC
2009
Springer
112views Cryptology» more  TCC 2009»
16 years 5 months ago
Oblivious Transfer from Weak Noisy Channels
Various results show that oblivious transfer can be implemented using the assumption of noisy channels. Unfortunately, this assumption is not as weak as one might think, because i...
Jürg Wullschleger
PODS
2006
ACM
122views Database» more  PODS 2006»
16 years 4 months ago
Space- and time-efficient deterministic algorithms for biased quantiles over data streams
Skew is prevalent in data streams, and should be taken into account by algorithms that analyze the data. The problem of finding "biased quantiles"-- that is, approximate...
Graham Cormode, Flip Korn, S. Muthukrishnan, Dives...
ATAL
2009
Springer
15 years 11 months ago
Multiagent learning in large anonymous games
In large systems, it is important for agents to learn to act effectively, but sophisticated multi-agent learning algorithms generally do not scale. An alternative approach is to ...
Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern
GECCO
2009
Springer
122views Optimization» more  GECCO 2009»
15 years 11 months ago
Evolving symmetric and modular neural networks for distributed control
Problems such as the design of distributed controllers are characterized by modularity and symmetry. However, the symmetries useful for solving them are often difficult to determ...
Vinod K. Valsalam, Risto Miikkulainen
SEMWEB
2009
Springer
15 years 11 months ago
Recommendations for Qualitative Ontology Matching Evaluations
This paper suggests appropriate rules to set up ontology matching evaluations and for golden standard construction and use which can significantly improve the quality of the preci...
Aliaksandr Autayeu, Vincenzo Maltese, Pierre Andre...