Sciweavers

1534 search results - page 242 / 307
» Application of data warehouse technology in power analysis
Sort
View
AES
2000
Springer
82views Cryptology» more  AES 2000»
15 years 2 months ago
Fast Implementations of AES Candidates
Of the five AES finalists four—MARS, RC6, Rijndael, Twofish— have not only (expected) good security but also exceptional performance on the PC platforms, especially on those...
Kazumaro Aoki, Helger Lipmaa
76
Voted
DAWAK
2007
Springer
15 years 4 months ago
Domination Mining and Querying
Abstract. Pareto dominance plays an important role in diverse application domains such as economics and e-commerce, and it is widely being used in multicriteria decision making. In...
Apostolos N. Papadopoulos, Apostolos Lyritsis, Ale...
EDOC
2006
IEEE
15 years 3 months ago
Enterprise Computing Systems as Information Factories
The analysis, and eventual approval or rejection, of new enterprise information technology (IT) initiatives often proceeds on the basis of informal estimates of return on investme...
K. Mani Chandy, Lu Tian, Daniel M. Zimmerman
IJCNN
2006
IEEE
15 years 3 months ago
Support Vector Machines to Weight Voters in a Voting System of Entity Extractors
—Support Vector Machines are used to combine the outputs of multiple entity extractors, thus creating a composite entity extraction system. The composite system has a significant...
Deborah Duong, James Venuto, Ben Goertzel, Ryan Ri...
BIOSIG
2010
152views Biometrics» more  BIOSIG 2010»
14 years 8 months ago
Biometric Systems in Future Preventive Scenarios - Legal Issues and Challenges
: The privacy and data protection challenges posed by biometric systems have been discussed in detail in the last years. Both security opportunities and privacy risks however may d...
Gerrit Hornung, Monika Desoi, Matthias Pocs