Sciweavers

1188 search results - page 203 / 238
» States of Knowledge
Sort
View
86
Voted
ATAL
2011
Springer
13 years 10 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
PKC
2009
Springer
172views Cryptology» more  PKC 2009»
15 years 10 months ago
CCA-Secure Proxy Re-encryption without Pairings
ded abstract of this paper appears in PKC 2009, S. Jarecki, G. Tsudik (Eds.), volume 5443 of LNCS, pp. 357-376, Sringer-Verlag, 2009. CCA-Secure Proxy Re-Encryption without Pairing...
Jun Shao, Zhenfu Cao
88
Voted
KDD
2002
ACM
147views Data Mining» more  KDD 2002»
15 years 10 months ago
Visualized Classification of Multiple Sample Types
The goal of the knowledge discovery and data mining is to extract the useful knowledge from the given data. Visualization enables us to find structures, features, patterns, and re...
Li Zhang, Aidong Zhang, Murali Ramanathan
125
Voted
LFCS
2009
Springer
15 years 4 months ago
Completeness Results for Memory Logics
Memory logics are a family of modal logics in which standard relational structures are augmented with data structures and additional operations to modify and query these structure...
Carlos Areces, Santiago Figueira, Sergio Mera
IROS
2008
IEEE
121views Robotics» more  IROS 2008»
15 years 4 months ago
A robot listens to music and counts its beats aloud by separating music from counting voice
— This paper presents a beat-counting robot that can count musical beats aloud, i.e., speak “one, two, three, four, one, two, ...” along music, while listening to music by us...
Takeshi Mizumoto, Ryu Takeda, Kazuyoshi Yoshii, Ka...