Sciweavers

7796 search results - page 1390 / 1560
» On Generalized Schur Numbers
Sort
View
CIKM
2004
Springer
15 years 3 months ago
Exploiting hierarchical relationships in conceptual search
As the number of available Web pages grows, users experience increasing difficulty finding documents relevant to their interests. One of the underlying reasons for this is that mo...
Devanand Ravindran, Susan Gauch
79
Voted
CIKM
2004
Springer
15 years 3 months ago
The robustness of content-based search in hierarchical peer to peer networks
Hierarchical peer to peer networks with multiple directory services are an important architecture for large-scale file sharing due to their effectiveness and efficiency. Recent ...
M. Elena Renda, Jamie Callan
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
77
Voted
ECML
2004
Springer
15 years 3 months ago
Batch Reinforcement Learning with State Importance
Abstract. We investigate the problem of using function approximation in reinforcement learning where the agent’s policy is represented as a classifier mapping states to actions....
Lihong Li, Vadim Bulitko, Russell Greiner
« Prev « First page 1390 / 1560 Last » Next »