Sciweavers

77016 search results - page 172 / 15404
» Modeling
Sort
View
FSE
2006
Springer
121views Cryptology» more  FSE 2006»
15 years 7 months ago
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
The Ideal-Cipher Model of a blockcipher is a well-known and widely-used model dating back to Shannon [24] and has seen frequent use in proving the security of various cryptographi...
John Black
124
Voted
IWANN
1995
Springer
15 years 7 months ago
An Application of the Saturated Attractor Analysis to Three Typical Models
The saturated attractor analysis, an approach proposed first in [FP] for a comprehensive study of the dynamics of the Linsker model and then successfully applied to the dynamic li...
Jianfeng Feng, Brunello Tirozzi
126
Voted
CAISE
2008
Springer
15 years 5 months ago
Semi-Automated Model Synchronisation in SOM
Model-driven engineering is at the forefront among recent attempts to information systems development. Models are gradually refined from domain specific descriptions to more concre...
Christian Flender, Thomas Hettel, Michael Lawley, ...
126
Voted
ECIR
2007
Springer
15 years 5 months ago
Probabilistic Models for Expert Finding
A common task in many applications is to find persons who are knowledgeable about a given topic (i.e., expert finding). In this paper, we propose and develop a general probabilis...
Hui Fang, ChengXiang Zhai
EMNLP
2007
15 years 5 months ago
Bayesian Document Generative Model with Explicit Multiple Topics
In this paper, we proposed a novel probabilistic generative model to deal with explicit multiple-topic documents: Parametric Dirichlet Mixture Model(PDMM). PDMM is an expansion of...
Issei Sato, Hiroshi Nakagawa
« Prev « First page 172 / 15404 Last » Next »