Sciweavers

13026 search results - page 2284 / 2606
» Probabilistic Relational Models
Sort
View
CRYPTO
2004
Springer
127views Cryptology» more  CRYPTO 2004»
15 years 10 months ago
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Abstract. In this paper we revisit one of the most popular passwordbased key exchange protocols, namely the OKE (for Open Key Exchange) scheme, proposed by Luck in 1997. Our result...
Dario Catalano, David Pointcheval, Thomas Pornin
DEXA
2004
Springer
108views Database» more  DEXA 2004»
15 years 10 months ago
Identifying Audience Preferences in Legal and Social Domains
Reasoning in legal and social domains appears not to be well dealt with by deductive approaches. This is because such reasoning is open-endedly defeasible, and because the various ...
Paul E. Dunne, Trevor J. M. Bench-Capon
DEXA
2004
Springer
140views Database» more  DEXA 2004»
15 years 10 months ago
Extracting User Behavior by Web Communities Technology on Global Web Logs
A lot of work has been done on extracting the model of web user behavior. Most of them target server-side logs that cannot track user behavior outside of the server. Recently, a no...
Shingo Otsuka, Masashi Toyoda, Jun Hirai, Masaru K...
ECAI
2004
Springer
15 years 10 months ago
New Insights on the Intuitionistic Interpretation of Default Logic
In this work we further investigate the relation, first found by Truszczy´nski, between modal logic S4F and Default Logic (DL), analyzing some interesting properties and showing ...
Pedro Cabalar, David Lorenzo
ECAI
2004
Springer
15 years 10 months ago
Context Dependence in Multiagent Resource Allocation
A standard assumption in studies of multiagent resource allocation problems is that the value an individual agent places on its assignment remains unchanged by any redistribution ...
Paul E. Dunne
« Prev « First page 2284 / 2606 Last » Next »