Sciweavers

468 search results - page 87 / 94
» Symmetric majority rules
Sort
View
CCS
2001
ACM
15 years 1 months ago
Efficient State Updates for Key Management
Encryption is widely used to enforce usage rules for digital content. In many scenarios content is encrypted using a group key which is known to a group of users that are allowed ...
Benny Pinkas
ESAW
2000
Springer
15 years 1 months ago
Engineering Social Order
Social Order becomes a major problem in MAS and in computer mediated human interaction. After explaining the notions of Social Order and Social Control, I claim that there are mult...
Cristiano Castelfranchi
AAAI
2007
15 years 6 days ago
The VITA Financial Services Sales Support Environment
Knowledge-based recommender technologies support customers and sales representatives in the identification of appropriate products and services. These technologies are especially ...
Alexander Felfernig, Klaus Isak, Kalman Szabo, Pet...
AUSDM
2008
Springer
274views Data Mining» more  AUSDM 2008»
14 years 12 months ago
Identifying Stock Similarity Based on Multi-event Episodes
Predicting stock market movements is always difficult. Investors try to guess a stock's behavior, but it often backfires. Thumb rules and intuition seems to be the major indi...
Abhi Dattasharma, Praveen Kumar Tripathi, Sridhar ...
CVDB
2005
ACM
14 years 12 months ago
Optimizing progressive query-by-example over pre-clustered large image databases
The typical mode for querying in an image content-based information system is query-by-example, which allows the user to provide an image as a query and to search for similar imag...
Anicet Kouomou Choupo, Laure Berti-Equille, Annie ...