Sciweavers

1169 search results - page 130 / 234
» Two Ways to Common Knowledge
Sort
View
AIED
2009
Springer
15 years 4 months ago
To Elicit Or To Tell: Does It Matter?
Abstract. While high interactivity has been one of the main characteristics of oneon-one human tutoring, a great deal of controversy surrounds the issue of whether interactivity is...
Min Chi, Pamela W. Jordan, Kurt VanLehn, Diane J. ...
ATAL
2009
Springer
15 years 4 months ago
Dialogues that account for different perspectives in collaborative argumentation
It is often the case that agents within a system have distinct types of knowledge. Furthermore, whilst common goals may be agreed upon, the particular representations of the indiv...
Elizabeth Black, Katie Atkinson
ICPP
2008
IEEE
15 years 4 months ago
On the Design of Fast Pseudo-Random Number Generators for the Cell Broadband Engine and an Application to Risk Analysis
Numerical simulations in computational physics, biology, and finance, often require the use of high quality and efficient parallel random number generators. We design and optimi...
David A. Bader, Aparna Chandramowlishwaran, Virat ...
CCS
2007
ACM
15 years 4 months ago
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
We construct two new multiparty digital signature schemes that allow multiple signers to sequentially produce a compact, fixed-length signature. First, we introduce a new primiti...
Alexandra Boldyreva, Craig Gentry, Adam O'Neill, D...
ISPEC
2007
Springer
15 years 4 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...