Results 1  10
of
79,565
Virtual time and global states of distributed systems.
 Proc. Workshop on Parallel and Distributed Algorithms,
, 1989
"... Abstract A distributed system can be characterized by the fact that the global state is distributed and that a common time base does not exist. However, the notion of time is an important concept in every day life of our decentralized \ r eal world" and helps to solve problems like getting a c ..."
Abstract

Cited by 744 (5 self)
 Add to MetaCart
artially ordered a n d form a lattice. By using timestamps and a simple clock update mechanism the structure o f c ausality is represented in an isomorphic way. The new model of time has a close analogy to Minkowski's relativistic spacetime and leads among others to an interesting characterization
Ktheory for operator algebras
 Mathematical Sciences Research Institute Publications
, 1998
"... p. XII line5: since p. 12: I blew this simple formula: should be α = −〈ξ, η〉/〈η, η〉. p. 2 I.1.1.4: The RieszFischer Theorem is often stated this way today, but neither Riesz nor Fischer (who worked independently) phrased it in terms of completeness of the orthogonal system {e int}. If [a, b] is a ..."
Abstract

Cited by 558 (0 self)
 Add to MetaCart
p. XII line5: since p. 12: I blew this simple formula: should be α = −〈ξ, η〉/〈η, η〉. p. 2 I.1.1.4: The RieszFischer Theorem is often stated this way today, but neither Riesz nor Fischer (who worked independently) phrased it in terms of completeness of the orthogonal system {e int}. If [a, b
Fusion, Propagation, and Structuring in Belief Networks
 ARTIFICIAL INTELLIGENCE
, 1986
"... Belief networks are directed acyclic graphs in which the nodes represent propositions (or variables), the arcs signify direct dependencies between the linked propositions, and the strengths of these dependencies are quantified by conditional probabilities. A network of this sort can be used to repre ..."
Abstract

Cited by 484 (8 self)
 Add to MetaCart
with the task of fusing and propagating the impacts of new information through the networks in such a way that, when equilibrium is reached, each proposition will be assigned a measure of belief consistent with the axioms of probability theory. It is shown that if the network is singly connected (e.g. tree
The homogeneous coordinate ring of a toric variety
, 1992
"... This paper will introduce the homogeneous coordinate ring S of a toric variety X. The ring S is a polynomial ring with one variable for each onedimensional cone in the fan ∆ determining X, and S has a natural grading determined by the monoid of effective divisor classes in the Chow group An−1(X) of ..."
Abstract

Cited by 474 (7 self)
 Add to MetaCart
) of X (where n = dim X). Using this graded ring, we will show that X behaves like projective space in many ways. The paper is organized into four sections as follows. In §1, we define the homogeneous coordinate ring S of X and compute its graded pieces in terms of global sections of certain coherent
Frequent Subgraph Discovery
, 2001
"... Over the years, frequent itemset discovery algorithms have been used to solve various interesting problems. As data mining techniques are being increasingly applied to nontraditional domains, existing approaches for finding frequent itemsets cannot be used as they cannot model the requirement of th ..."
Abstract

Cited by 406 (10 self)
 Add to MetaCart
of these domains. An alternate way of modeling the objects in these data sets, is to use a graph to model the database objects. Within that model, the problem of finding frequent patterns becomes that of discovering subgraphs that occur frequently over the entire set of graphs. In this paper we present a
Isomorphism
"... This threepart workshop presentation explores the _ideas of Milton Erickson on the therapeutic relationship and the therapeutic use of metaphor, and applies these ideas to experiential education and adventure therapy. Part 1 introduces the practitioner to the core philosophy within an Ericksonian a ..."
Abstract
 Add to MetaCart
This threepart workshop presentation explores the _ideas of Milton Erickson on the therapeutic relationship and the therapeutic use of metaphor, and applies these ideas to experiential education and adventure therapy. Part 1 introduces the practitioner to the core philosophy within an Ericksonian approach: "utilization" of a client's behavior and symptoms as the material for therapy. In order to utilize this material, the practitioner must develop observational skills to pick up on the minimal cues provided by the client. Zeig's diamond model of the therapeutic relationship describes the "position " of the practitioner in relation to the client and the "posture " or stance of the practitioner within the relationship. Position involves perception, power, compassion, and social role, while postures include response readiness, creativity for change, perceptual acuity, indirect communication or metaphor,
Isomorphism
, 2008
"... This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal noncommercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or sel ..."
Abstract
 Add to MetaCart
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal noncommercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit:
isomorphism of
"... Resolution of conflicting views concerning frequencyresponse models for conducting materials with dispersive relaxation, and ..."
Abstract
 Add to MetaCart
Resolution of conflicting views concerning frequencyresponse models for conducting materials with dispersive relaxation, and
OneWay Functions and the Isomorphism Conjecture
, 2009
"... We study the Isomorphism Conjecture proposed by Berman and Hartmanis. It states that all sets complete for NP under polynomialtime manyone reductions are Pisomorphic to each other. From previous research it has been widely believed that all NPcomplete sets are reducible each other by onetoone ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
toone and lengthincreasing polynomialtime reductions, but we may not hope for the full pisomorphism due to the existence of oneway functions. Here we showed two results on the relation between oneway functions and the Isomorphism Conjecture. Firstly, we imporve the result of Agrawal [Agrawal, CCC’02] to show
Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new Families of Asymmetric Algorithms
, 1996
"... In [11] T. Matsumoto and H. Imai described a new asymmetric algorithm based on multivariate polynomials of degree twoo ver a finite field. Then in [14] this algorithm was broken. The aim of this paper is to show that despite this result it is probably possible to use multivariate polynomials of degr ..."
Abstract

Cited by 150 (9 self)
 Add to MetaCart
way. Moreover HFE (with properly chosen parameters) resist to all known attacks and can be used in order to givevery short asymmetric signatures or very short encrypted messages (of length 128 bits or 64 bits for example). IP can be used for asymmetric authentications or signatures. IP authentications
Results 1  10
of
79,565