Results 11 - 20
of
8,146
A logic of authentication
- ACM TRANSACTIONS ON COMPUTER SYSTEMS
, 1990
"... Questions of belief are essential in analyzing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis; we show how various protocols differ subtly with respect to the required ..."
Abstract
-
Cited by 1332 (22 self)
- Add to MetaCart
Questions of belief are essential in analyzing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis; we show how various protocols differ subtly with respect to the required
Features of similarity.
- Psychological Review
, 1977
"... Similarity plays a fundamental role in theories of knowledge and behavior. It serves as an organizing principle by which individuals classify objects, form concepts, and make generalizations. Indeed, the concept of similarity is ubiquitous in psychological theory. It underlies the accounts of stimu ..."
Abstract
-
Cited by 1455 (2 self)
- Add to MetaCart
and metric assumptions are open to question. It has been argued by many authors that dimensional representations are appropriate for certain stimuli (e.g., colors, tones) but not for others. It seems more appropriate to represent faces, countries, or personalities in terms of many qualitative features than
A framework for information systems architecture.
- IBM Syst. J.,
, 1987
"... With increasing size and complexity of the implementations of information systems, it is necessary to use some logical construct (or architecture) for defining and controlling the interfaces and the integration of all of the components of the system. This paper defines information systems architect ..."
Abstract
-
Cited by 546 (0 self)
- Add to MetaCart
and more a necessity for establishing some order and control in the investment of information systems resources. The cost involved and the success of the business depending increasingly on its information systems require a disciplined approach to the management of those systems. On the assumption
Genomic control for association studies
, 1999
"... A dense set of single nucleotide polymorphisms (SNP) covering the genome and an efficient method to assess SNP genotypes are expected to be available in the near future. An outstanding question is how to use these technologies efficiently to identify genes affecting liability to complex disorders. ..."
Abstract
-
Cited by 480 (13 self)
- Add to MetaCart
A dense set of single nucleotide polymorphisms (SNP) covering the genome and an efficient method to assess SNP genotypes are expected to be available in the near future. An outstanding question is how to use these technologies efficiently to identify genes affecting liability to complex disorders
Questioning Assumptions about Race, Social Class and Crime Portrayal: An Analysis of Ten Years of Law and Order
"... Abstract: Social researchers have paid significant interest to the portrayal of non-whites and members of the lower classes in both news broadcasts and the fictional crime drama. They have also explored whether social programming uses educational entertainment to positively sway public opinion or as ..."
Abstract
- Add to MetaCart
or as propaganda to support the status quo. Little has been done recently to determine the representation of intra- versus interracial crime in the crime drama. Also, there is the underlying assumption that may be taken almost a priori by viewers that criminals are more often portrayed as poor and non
Experimental evaluation of wireless simulation assumptions
, 2004
"... All analytical and simulation research on ad hoc wireless networks must necessarily model radio propagation using simplifying assumptions. A growing body of research, however, indicates that the behavior of the protocol stack may depend significantly on these underlying assumptions. The standard res ..."
Abstract
-
Cited by 260 (12 self)
- Add to MetaCart
All analytical and simulation research on ad hoc wireless networks must necessarily model radio propagation using simplifying assumptions. A growing body of research, however, indicates that the behavior of the protocol stack may depend significantly on these underlying assumptions. The standard
Hitting the Memory Wall: Implications of the Obvious
- Computer Architecture News
, 1995
"... This brief note points out something obvious--- something the authors "knew" without really understanding. With apologies to those who did understand, we offer it to those others who, like us, missed the point. We all know that the rate of improvement in microprocessor speed exceeds the ra ..."
Abstract
-
Cited by 393 (1 self)
- Add to MetaCart
an issue, downstream someplace it will be a much bigger one. How big and how soon? The answers to these questions are what the authors had failed to appreciate. To get a handle on the answers, consider an old friend--- the equation for the average time to access memory, where t c and t m are the cache
On Lattices, Learning with Errors, Random Linear Codes, and Cryptography
- In STOC
, 2005
"... Our main result is a reduction from worst-case lattice problems such as SVP and SIVP to a certain learning problem. This learning problem is a natural extension of the ‘learning from parity with error’ problem to higher moduli. It can also be viewed as the problem of decoding from a random linear co ..."
Abstract
-
Cited by 364 (6 self)
- Add to MetaCart
code. This, we believe, gives a strong indication that these problems are hard. Our reduction, however, is quantum. Hence, an efficient solution to the learning problem implies a quantum algorithm for SVP and SIVP. A main open question is whether this reduction can be made classical. We also present a
The Power of Convex Relaxation: Near-Optimal Matrix Completion
, 2009
"... This paper is concerned with the problem of recovering an unknown matrix from a small fraction of its entries. This is known as the matrix completion problem, and comes up in a great number of applications, including the famous Netflix Prize and other similar questions in collaborative filtering. In ..."
Abstract
-
Cited by 359 (7 self)
- Add to MetaCart
This paper is concerned with the problem of recovering an unknown matrix from a small fraction of its entries. This is known as the matrix completion problem, and comes up in a great number of applications, including the famous Netflix Prize and other similar questions in collaborative filtering
Questioning the Assumptions
"... The report "Associations with High-Risk Sexual Behavior " in this issue by Steiner and his col-leagues! raises many issues that invite further discussion and exploration. Certainly, with the rise in rates of persons positive for human immuno-deficiency virus (HIV) infection, research on un ..."
Abstract
- Add to MetaCart
The report "Associations with High-Risk Sexual Behavior " in this issue by Steiner and his col-leagues! raises many issues that invite further discussion and exploration. Certainly, with the rise in rates of persons positive for human immuno-deficiency virus (HIV) infection, research on un-derstanding primary prevention of this disease is timely and relevant. Early attempts at research into the behavioral correlates of population groups with dispropor-tionately high HIV positivity rates initially fo-cused on the information base of the population. Since then, several well-documented studies have reported that information by itself is not suffi-cient to prompt behavioral change that protects against HIV exposure.2,3
Results 11 - 20
of
8,146