Sciweavers

3318 search results - page 426 / 664
» The Weak Instance Model
Sort
View
IICS
2004
Springer
15 years 9 months ago
Towards Logical Hypertext Structure
Facing the retrieval problem according to the overwhelming set of documents online the adaptation of text categorization to web units has recently been pushed. The aim is to utiliz...
Alexander Mehler, Matthias Dehmer, Rüdiger Gl...
ICALP
2003
Springer
15 years 9 months ago
Quantitative Analysis of Probabilistic Lossy Channel Systems
Many protocols are designed to operate correctly even in the case where the underlying communication medium is faulty. To capture the behaviour of such protocols, lossy channel sy...
Alexander Moshe Rabinovich
124
Voted
IEAAIE
1998
Springer
15 years 8 months ago
Generating Heuristics to Control Configuration Processes
Abstract. Configuration is the process of composing a system from a set of components such that the system fulfills a set of desired demands. The configuration process relies on a ...
Benno Stein
SAT
2010
Springer
158views Hardware» more  SAT 2010»
15 years 8 months ago
Dynamic Scoring Functions with Variable Expressions: New SLS Methods for Solving SAT
Abstract. We introduce a new conceptual model for representing and designing Stochastic Local Search (SLS) algorithms for the propositional satisfiability problem (SAT). Our model...
Dave A. D. Tompkins, Holger H. Hoos
148
Voted
ACNS
2004
Springer
131views Cryptology» more  ACNS 2004»
15 years 8 months ago
Evaluating Security of Voting Schemes in the Universal Composability Framework
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting pr...
Jens Groth