Sciweavers

1055 search results - page 32 / 211
» order 2002
Sort
View
145
Voted
CORR
2002
Springer
122views Education» more  CORR 2002»
15 years 4 months ago
On alternative approach for verifiable secret sharing
The proposed approach works for any underlying secret sharing scheme. It is based on the concept of verification sets of participants, related to authorized set of participants. T...
Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk
CUZA
2002
132views more  CUZA 2002»
15 years 4 months ago
Agent-Client Interaction in a Web-Based E-Commerce System
In order for agent technology to fulfill its promise, it must be integrated with other existing technologies. In this paper we address one of the problems occurring in a real-world...
Minor Gordon, Marcin Paprzycki, Violetta Galant
132
Voted
DM
2002
101views more  DM 2002»
15 years 4 months ago
Pseudocomplements of closure operators on posets
Some recent results provide su cient conditions for complete lattices of closure operators on complete lattices, ordered pointwise, to be pseudocomplemented. This paper gives resu...
Francesco Ranzato
141
Voted
DM
2002
110views more  DM 2002»
15 years 4 months ago
Cyclic BSEC of block size 3
Abstract. A k-sized balanced sampling plan excluding contiguous units of order v and index , denoted by BSEC(v, k, ), is said to be bicyclic if it admits an automorphism consisting...
Ruizhong Wei
156
Voted
IPL
2002
98views more  IPL 2002»
15 years 4 months ago
Evolutionary induced decision trees for dangerous software modules prediction
We study the possibility of constructing decision trees with evolutionary algorithms in order to increase their predictive accuracy. We present a self-adapting evolutionary algori...
Vili Podgorelec, Peter Kokol