Sciweavers

1253 search results - page 44 / 251
» order 2000
Sort
View
89
Voted
EUROCRYPT
2000
Springer
15 years 2 months ago
Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free
One of the basic problems in cryptography is the generation of a common secret key between two parties, for instance in order to communicate privately. In this paper we consider in...
Ueli M. Maurer, Stefan Wolf
83
Voted
ICALP
2000
Springer
15 years 2 months ago
Formalizing the Development of Agent-Based Systems Using Graph Processes
Graph processes are used in order to formalize the relation between global requirement specifications of multi-agent systems by means of message sequence charts, and implementatio...
Ralph Depke, Reiko Heckel
74
Voted
PAKDD
2000
ACM
100views Data Mining» more  PAKDD 2000»
15 years 2 months ago
Discovery of Relevant Weights by Minimizing Cross-Validation Error
In order to discover relevant weights of neural networks, this paper proposes a novel method to learn a distinct squared penalty factor for each weight as a minimization problem ov...
Kazumi Saito, Ryohei Nakano
ACL
2000
15 years 9 days ago
Lexical Transfer Using a Vector-Space Model
Building a bilingual dictionary for transfer in a machine translation system is conventionally done by hand and is very time-consuming. In order to overcome this bottleneck, we pr...
Eiichiro Sumita
82
Voted
FLAIRS
2000
15 years 8 days ago
Distributed Multi-Agent MSBN: Implementing Verification
Multiply Sectioned Bayesian Networks (MSBN)provide a coherence framework for multi-agent distributed interpretation tasks. Duringthe construction or dynamicformation of an MSBN,au...
Hongyu Geng, Yang Xiang