Sciweavers

1727 search results - page 318 / 346
» A Technique for Large Automated Mechanism Design Problems
Sort
View
ICMI
2007
Springer
138views Biometrics» more  ICMI 2007»
15 years 4 months ago
Speech-filtered bubble ray: improving target acquisition on display walls
The rapid development of large interactive wall displays has been accompanied by research on methods that allow people to interact with the display at a distance. The basic method...
Edward Tse, Mark S. Hancock, Saul Greenberg
PLDI
2003
ACM
15 years 3 months ago
Compile-time dynamic voltage scaling settings: opportunities and limits
With power-related concerns becoming dominant aspects of hardware and software design, significant research effort has been devoted towards system power minimization. Among run-t...
Fen Xie, Margaret Martonosi, Sharad Malik
BMCBI
2006
98views more  BMCBI 2006»
14 years 10 months ago
JLIN: A java based linkage disequilibrium plotter
Background: A great deal of effort and expense are being expended internationally in attempts to detect genetic polymorphisms contributing to susceptibility to complex human disea...
Kim W. Carter, Pamela A. McCaskie, Lyle J. Palmer
KDD
2005
ACM
107views Data Mining» more  KDD 2005»
15 years 3 months ago
Predicting the product purchase patterns of corporate customers
This paper describes TIPPPS (Time Interleaved Product Purchase Prediction System), which analyses billing data of corporate customers in a large telecommunications company in orde...
Bhavani Raskutti, Alan Herschtal
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
15 years 2 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor