Sciweavers

8647 search results - page 1699 / 1730
» The Container Selection Problem
Sort
View
ICISC
2000
126views Cryptology» more  ICISC 2000»
14 years 11 months ago
Cryptographic Applications of Sparse Polynomials over Finite Rings
Abstract. This paper gives new examples that exploit the idea of using sparse polynomials with restricted coefficients over a finite ring for designing fast, reliable cryptosystems...
William D. Banks, Daniel Lieman, Igor Shparlinski,...
ISMB
2000
14 years 11 months ago
An Evaluation of Ontology Exchange Languages for Bioinformatics
Ontologies are specifications of the concepts in a given field, and of the relationships among those concepts. The development of ontologies for molecular-biology information and ...
Robin McEntire, Peter D. Karp, Neil F. Abernethy, ...
79
Voted
WEBNET
1996
14 years 11 months ago
Digital Libraries Based on Full-Text Retrieval
: Because digital libraries are expensive to create and maintain, Internet analogs of public libraries--reliable, quality, community services--have only recently begun to appear. A...
Ian H. Witten, Craig G. Nevill-Manning, Sally Jo C...
63
Voted
IJCAI
1989
14 years 10 months ago
And-Or Graphs Applied to RUE Resolution
In equality-based binary r e s o l u t i o n , the v i a b i l i t y t e s t is used as a decision mechanism to select disagreement sets and also to define the RUE u n i f i e r ....
Vincent J. Digricoli, James J. Lu, V. S. Subrahman...
COLING
1992
14 years 10 months ago
Generating Coherent Argumentative Paragraphs
Q Should I take AI this semester? We address the problem of generating a coherent A If you want to take courses likeparagraph presenting arguments for a conclusion in a Natural La...
Michael Elhadad
« Prev « First page 1699 / 1730 Last » Next »