Sciweavers

2372 search results - page 459 / 475
» Probabilistic calling context
Sort
View
CRYPTO
2010
Springer
162views Cryptology» more  CRYPTO 2010»
15 years 20 days ago
On Strong Simulation and Composable Point Obfuscation
The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: Anything computable by an efficient adversary given the obfuscated program can also be co...
Nir Bitansky, Ran Canetti
ICDE
2010
IEEE
167views Database» more  ICDE 2010»
15 years 20 days ago
Top-k pipe join
Abstract—In the context of service composition and orchestration, service invocation is typically scheduled according to execution plans, whose topology establishes whether diffe...
Davide Martinenghi, Marco Tagliasacchi
AAMAS
2008
Springer
15 years 18 days ago
DARE: a system for distributed abductive reasoning
Abductive reasoning is a well established field of Artificial Intelligence widely applied to different problem domains not least cognitive robotics and planning. It has been used ...
Jiefei Ma, Alessandra Russo, Krysia Broda, Keith C...
100
Voted
AIEDU
2007
83views more  AIEDU 2007»
15 years 18 days ago
Evidence-based Approach to Interacting with Open Student Models
Research efforts focused on developing "active reports" are currently underway. Active reports are designed to foster communication among teachers, students, and parents ...
Diego Zapata-Rivera, Eric G. Hansen, Valerie J. Sh...
137
Voted
AMAI
2007
Springer
15 years 18 days ago
Relational concept discovery in structured datasets
Relational datasets, i.e., datasets in which individuals are described both by their own features and by their relations to other individuals, arise from various sources such as d...
Marianne Huchard, Mohamed Rouane Hacene, Cyril Rou...