• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 8,146
Next 10 →

A logic of authentication

by Michael Burrows, Martín Abadi, Roger Needham - ACM TRANSACTIONS ON COMPUTER SYSTEMS , 1990
"... Questions of belief are essential in analyzing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis; we show how various protocols differ subtly with respect to the required ..."
Abstract - Cited by 1332 (22 self) - Add to MetaCart
Questions of belief are essential in analyzing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis; we show how various protocols differ subtly with respect to the required

Features of similarity.

by Amos Tversky - Psychological Review , 1977
"... Similarity plays a fundamental role in theories of knowledge and behavior. It serves as an organizing principle by which individuals classify objects, form concepts, and make generalizations. Indeed, the concept of similarity is ubiquitous in psychological theory. It underlies the accounts of stimu ..."
Abstract - Cited by 1455 (2 self) - Add to MetaCart
and metric assumptions are open to question. It has been argued by many authors that dimensional representations are appropriate for certain stimuli (e.g., colors, tones) but not for others. It seems more appropriate to represent faces, countries, or personalities in terms of many qualitative features than

A framework for information systems architecture.

by J A Zachman - IBM Syst. J., , 1987
"... With increasing size and complexity of the implementations of information systems, it is necessary to use some logical construct (or architecture) for defining and controlling the interfaces and the integration of all of the components of the system. This paper defines information systems architect ..."
Abstract - Cited by 546 (0 self) - Add to MetaCart
and more a necessity for establishing some order and control in the investment of information systems resources. The cost involved and the success of the business depending increasingly on its information systems require a disciplined approach to the management of those systems. On the assumption

Genomic control for association studies

by B. Devlin, Kathryn Roeder , 1999
"... A dense set of single nucleotide polymorphisms (SNP) covering the genome and an efficient method to assess SNP genotypes are expected to be available in the near future. An outstanding question is how to use these technologies efficiently to identify genes affecting liability to complex disorders. ..."
Abstract - Cited by 480 (13 self) - Add to MetaCart
A dense set of single nucleotide polymorphisms (SNP) covering the genome and an efficient method to assess SNP genotypes are expected to be available in the near future. An outstanding question is how to use these technologies efficiently to identify genes affecting liability to complex disorders

Questioning Assumptions about Race, Social Class and Crime Portrayal: An Analysis of Ten Years of Law and Order

by unknown authors
"... Abstract: Social researchers have paid significant interest to the portrayal of non-whites and members of the lower classes in both news broadcasts and the fictional crime drama. They have also explored whether social programming uses educational entertainment to positively sway public opinion or as ..."
Abstract - Add to MetaCart
or as propaganda to support the status quo. Little has been done recently to determine the representation of intra- versus interracial crime in the crime drama. Also, there is the underlying assumption that may be taken almost a priori by viewers that criminals are more often portrayed as poor and non

Experimental evaluation of wireless simulation assumptions

by Calvin Newport, David Kotz, Yougu Yuan, Robert S. Gray, Jason Liu, Chip Elliott , 2004
"... All analytical and simulation research on ad hoc wireless networks must necessarily model radio propagation using simplifying assumptions. A growing body of research, however, indicates that the behavior of the protocol stack may depend significantly on these underlying assumptions. The standard res ..."
Abstract - Cited by 260 (12 self) - Add to MetaCart
All analytical and simulation research on ad hoc wireless networks must necessarily model radio propagation using simplifying assumptions. A growing body of research, however, indicates that the behavior of the protocol stack may depend significantly on these underlying assumptions. The standard

Hitting the Memory Wall: Implications of the Obvious

by Wm. A. Wulf, Sally A. Mckee - Computer Architecture News , 1995
"... This brief note points out something obvious--- something the authors "knew" without really understanding. With apologies to those who did understand, we offer it to those others who, like us, missed the point. We all know that the rate of improvement in microprocessor speed exceeds the ra ..."
Abstract - Cited by 393 (1 self) - Add to MetaCart
an issue, downstream someplace it will be a much bigger one. How big and how soon? The answers to these questions are what the authors had failed to appreciate. To get a handle on the answers, consider an old friend--- the equation for the average time to access memory, where t c and t m are the cache

On Lattices, Learning with Errors, Random Linear Codes, and Cryptography

by Oded Regev - In STOC , 2005
"... Our main result is a reduction from worst-case lattice problems such as SVP and SIVP to a certain learning problem. This learning problem is a natural extension of the ‘learning from parity with error’ problem to higher moduli. It can also be viewed as the problem of decoding from a random linear co ..."
Abstract - Cited by 364 (6 self) - Add to MetaCart
code. This, we believe, gives a strong indication that these problems are hard. Our reduction, however, is quantum. Hence, an efficient solution to the learning problem implies a quantum algorithm for SVP and SIVP. A main open question is whether this reduction can be made classical. We also present a

The Power of Convex Relaxation: Near-Optimal Matrix Completion

by Emmanuel J. Candès, Terence Tao , 2009
"... This paper is concerned with the problem of recovering an unknown matrix from a small fraction of its entries. This is known as the matrix completion problem, and comes up in a great number of applications, including the famous Netflix Prize and other similar questions in collaborative filtering. In ..."
Abstract - Cited by 359 (7 self) - Add to MetaCart
This paper is concerned with the problem of recovering an unknown matrix from a small fraction of its entries. This is known as the matrix completion problem, and comes up in a great number of applications, including the famous Netflix Prize and other similar questions in collaborative filtering

Questioning the Assumptions

by Slatkoff Sf Curtis P, Coker A. Patients As Subjects, Lidz Cw, Meisel A. Informed Con
"... The report "Associations with High-Risk Sexual Behavior " in this issue by Steiner and his col-leagues! raises many issues that invite further discussion and exploration. Certainly, with the rise in rates of persons positive for human immuno-deficiency virus (HIV) infection, research on un ..."
Abstract - Add to MetaCart
The report "Associations with High-Risk Sexual Behavior " in this issue by Steiner and his col-leagues! raises many issues that invite further discussion and exploration. Certainly, with the rise in rates of persons positive for human immuno-deficiency virus (HIV) infection, research on un-derstanding primary prevention of this disease is timely and relevant. Early attempts at research into the behavioral correlates of population groups with dispropor-tionately high HIV positivity rates initially fo-cused on the information base of the population. Since then, several well-documented studies have reported that information by itself is not suffi-cient to prompt behavioral change that protects against HIV exposure.2,3
Next 10 →
Results 11 - 20 of 8,146
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University