Sciweavers

2027 search results - page 99 / 406
» When is it best to best-respond
Sort
View
ACISP
2008
Springer
15 years 2 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...
FOSSACS
2008
Springer
15 years 2 months ago
Optimal Lower Bounds on Regular Expression Size Using Communication Complexity
The problem of converting deterministic finite automata into (short) regular expressions is considered. It is known that the required expression size is 2(n) in the worst case for ...
Hermann Gruber, Jan Johannsen
ACL
2008
15 years 2 months ago
Credibility Improves Topical Blog Post Retrieval
Topical blog post retrieval is the task of ranking blog posts with respect to their relevance for a given topic. To improve topical blog post retrieval we incorporate textual cred...
Wouter Weerkamp, Maarten de Rijke
AIPRF
2008
15 years 2 months ago
A Coherent and Heterogeneous Approach to Clustering
Despite outstanding successes of the state-of-the-art clustering algorithms, many of them still suffer from shortcomings. Mainly, these algorithms do not capture coherency and homo...
Arian Maleki, Nima Asgharbeygi
106
Voted
CCCG
2008
15 years 2 months ago
Application of computational geometry to network p-center location problems
In this paper we showed that a p( 2)-center location problem in general networks can be transformed to the well known Klee's measure problem [5]. This resulted in an improved...
Qiaosheng Shi, Binay K. Bhattacharya