Sciweavers

728 search results - page 65 / 146
» New Directions in Question Answering
Sort
View
ESORICS
2004
Springer
15 years 6 months ago
A Vector Model of Trust for Developing Trustworthy Systems
All security services rely to a great extent on some notion of trust. However, even today, there is no accepted formalism or technique for the specification of trust and for reaso...
Indrajit Ray, Sudip Chakraborty
INEX
2004
Springer
15 years 6 months ago
NEXI, Now and Next
NEXI was introduced in INEX 2004 as a query language for specifying structured and unstructured queries on XML documents. A language expressive enough for INEX yet simple enough f...
Andrew Trotman, Börkur Sigurbjörnsson
EUROMICRO
1997
IEEE
15 years 5 months ago
A RISC Microprocessor for Contactless Smart Cards
Two years ago [3] we began to study a R.I.S.C. approachfor smart card microprocessors. We reconsider this research to answer the question of the new technology of smart cards: the...
Christian Cormier, Georges Grimonprez
CRYPTO
2006
Springer
88views Cryptology» more  CRYPTO 2006»
15 years 5 months ago
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
Let H1, H2 be two hash functions. We wish to construct a new hash function H that is collision resistant if at least one of H1 or H2 is collision resistant. Concatenating the outpu...
Dan Boneh, Xavier Boyen
PPSN
2000
Springer
15 years 5 months ago
Interacting Trajectories in Design Space and Niche Space: A Philosopher Speculates About Evolution
Abstract. There are evolutionary trajectories in two different but related spaces, design space and niche space. Coevolution occurs in parallel trajectories in both spaces, with co...
Aaron Sloman