Sciweavers

4397 search results - page 336 / 880
» Relational Algebra Operations
Sort
View
220
Voted
KR
2004
Springer
15 years 10 months ago
Evidence and Belief
We discuss the representation of knowledge and of belief from the viewpoint of decision theory. While the Bayesian approach enjoys general-purpose applicability and axiomatic foun...
Itzhak Gilboa, David Schmeidler
FOSSACS
2001
Springer
15 years 9 months ago
On Regular Message Sequence Chart Languages and Relationships to Mazurkiewicz Trace Theory
Hierarchical Message Sequence Charts are a well-established formalism to specify telecommunication protocols. In this model, numerous undecidability results were obtained recently ...
Rémi Morin
139
Voted
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
DAGSTUHL
1997
15 years 6 months ago
Scattered Data Techniques for Surfaces
This survey presents several techniques for solving variants of the following scattered data interpolation problem: given a nite set of N points in R3, nd a surface that interpola...
Suresh K. Lodha, Richard Franke
CORR
2011
Springer
185views Education» more  CORR 2011»
14 years 12 months ago
Sound and Complete Query Answering in Intensional P2P Data Integration
Contemporary use of the term ’intension’ derives from the traditional logical doctrine that an idea has both an extension and an intension. In this paper we introduce an intens...
Zoran Majkic