Sciweavers

6092 search results - page 1157 / 1219
» Acknowledgments in Human-Computer Interaction
Sort
View
143
Voted
SDM
2003
SIAM
123views Data Mining» more  SDM 2003»
15 years 4 months ago
Fast Online SVD Revisions for Lightweight Recommender Systems
The singular value decomposition (SVD) is fundamental to many data modeling/mining algorithms, but SVD algorithms typically have quadratic complexity and require random access to ...
Matthew Brand
133
Voted
WM
2003
15 years 4 months ago
Experience Management within Project Management Processes
: The business process revolution has had two impacts on project management: the recognition of a process perspective (such as the 39 appearing in the PMBOK), and the acknowledgeme...
Maya Kaner, Reuven Karni
121
Voted
TMC
2008
132views more  TMC 2008»
15 years 3 months ago
A Cross-Layer Approach for Per-Station Fairness in TCP over WLANs
In this paper, we investigate the issue of per-station fairness in TCP over IEEE 802.11-compliant wireless local area networks (WLANs), especially in Wi-Fi hot spots. It is asserte...
Eun-Chan Park, Dong-Young Kim, Hwangnam Kim, Chong...
125
Voted
CORR
2011
Springer
189views Education» more  CORR 2011»
14 years 10 months ago
Aging in language dynamics
Human languages evolve continuously, and a puzzling problem is how to reconcile the apparent robustness of most of the deep linguistic structures we use with the evidence that the...
Animesh Mukherjee, Francesca Tria, Andrea Baronche...
ASIACRYPT
2011
Springer
14 years 3 months ago
Leakage-Resilient Cryptography from the Inner-Product Extractor
We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bou...
Stefan Dziembowski, Sebastian Faust
« Prev « First page 1157 / 1219 Last » Next »