Sciweavers

237 search results - page 35 / 48
» On information hiding with incomplete information about steg...
Sort
View
AAAI
2007
15 years 2 days ago
Spatial Representation and Reasoning for Human-Robot Collaboration
How should a robot represent and reason about spatial information when it needs to collaborate effectively with a human? The form of spatial representation that is useful for robo...
William G. Kennedy, Magdalena D. Bugajska, Matthew...
SIGSOFT
2004
ACM
15 years 10 months ago
How a good software practice thwarts collaboration: the multiple roles of APIs in software development
The principle of information hiding has been very influential in software engineering since its inception in 1972. This principle prescribes that software modules hide implementat...
Cleidson R. B. de Souza, David F. Redmiles, Li-Te ...
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
15 years 3 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith
APN
2005
Springer
15 years 3 months ago
Genetic Process Mining
The topic of process mining has attracted the attention of both researchers and tool vendors in the Business Process Management (BPM) space. The goal of process mining is to discov...
Wil M. P. van der Aalst, Ana Karla A. de Medeiros,...
EKAW
2000
Springer
15 years 1 months ago
Torture Tests: A Quantitative Analysis for the Robustness of Knowledge-Based Systems
Abstract. The overall aim of this paper is to provide a general setting for quantitative quality measures of Knowledge-Based System behavior which is widely applicable to many Know...
Perry Groot, Frank van Harmelen, Annette ten Teije