Sciweavers

18155 search results - page 3350 / 3631
» Point
Sort
View
AI
2000
Springer
15 years 8 months ago
Keep It Simple: A Case-Base Maintenance Policy Based on Clustering and Information Theory
Abstract. Today’s case based reasoning applications face several challenges. In a typical application, the case bases grow at a very fast rate and their contents become increasin...
Qiang Yang, Jing Wu
ASIACRYPT
2000
Springer
15 years 8 months ago
CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government
We will describe the outline of the cryptographic technology evaluation project in Japan and those present conditions. The purpose of this project is that the cyptographic technolo...
Hideki Imai, Atsuhiro Yamagishi
166
Voted
CIKM
2000
Springer
15 years 8 months ago
Dimensionality Reduction and Similarity Computation by Inner Product Approximations
—As databases increasingly integrate different types of information such as multimedia, spatial, time-series, and scientific data, it becomes necessary to support efficient retri...
Ömer Egecioglu, Hakan Ferhatosmanoglu
CONCUR
2000
Springer
15 years 8 months ago
The Control of Synchronous Systems
In the synchronous composition of processes, one process may prevent another process from proceeding unless compositions without a wellde ned productbehavior are ruled out. They ca...
Luca de Alfaro, Thomas A. Henzinger, Freddy Y. C. ...
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
« Prev « First page 3350 / 3631 Last » Next »