Sciweavers

2066 search results - page 174 / 414
» Word Maturity: Computational Modeling of Word Knowledge
Sort
View
115
Voted
ACST
2006
14 years 11 months ago
An efficient search algorithm for partially ordered sets
Consider the problem of membership query for a given partially ordered set. We devise a greedy algorithm which can produce near-optimal search strategies. Rigorous analysis has be...
Yan Chen
67
Voted
IJON
2007
118views more  IJON 2007»
14 years 10 months ago
CATS benchmark time series prediction by Kalman smoother with cross-validated noise density
This article presents the winning solution to the CATS time series prediction competition. The solution is based on classical optimal linear estimation theory. The proposed method...
Simo Särkkä, Aki Vehtari, Jouko Lampinen
98
Voted
EUROCRYPT
2007
Springer
15 years 2 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
IPPS
2005
IEEE
15 years 3 months ago
GUARD: Gossip Used for Autonomous Resource Detection
A growing trend in the development and deployment of grid computing systems is decentralization. Decentralizing these systems helps make them more scalable and robust, but poses s...
Sagnik Nandy, Larry Carter, Jeanne Ferrante
93
Voted
CSL
2010
Springer
14 years 11 months ago
From Feasible Proofs to Feasible Computations
We shall discuss several situations in which it is possible to extract from a proof, be it a proof in a first-order theory or a propositional proof, some feasible computational inf...
Jan Krajícek