Sciweavers

10275 search results - page 2050 / 2055
» Case Studies of Autonomy
Sort
View
CIKM
2011
Springer
13 years 9 months ago
Citation count prediction: learning to estimate future citations for literature
In most of the cases, scientists depend on previous literature which is relevant to their research fields for developing new ideas. However, it is not wise, nor possible, to trac...
Rui Yan, Jie Tang, Xiaobing Liu, Dongdong Shan, Xi...
CODES
2011
IEEE
13 years 9 months ago
Analysis and optimization of fault-tolerant task scheduling on multiprocessor embedded systems
Reliability is a major requirement for most safety-related systems. To meet this requirement, fault-tolerant techniques such as hardware replication and software re-execution are ...
Jia Huang, Jan Olaf Blech, Andreas Raabe, Christia...
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
13 years 9 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
DOCENG
2011
ACM
13 years 9 months ago
An exploratory analysis of mind maps
The results presented in this paper come from an exploratory study of 19,379 mind maps created by 11,179 users from the mind mapping applications ‘Docear’ and ‘MindMeister...
Jöran Beel, Stefan Langer
FSKD
2011
Springer
279views Fuzzy Logic» more  FSKD 2011»
13 years 9 months ago
Modelling the seasonal climate variability and its effects on vintage wines from Marlborough, NZ
— The paper presents some interim results from an ongoing research on the application of data/text mining methodologies being investigated to modelling the seasonal climate varia...
Subana Shanmuganathan, Ana Perez Kuroki, Ajit Nara...
« Prev « First page 2050 / 2055 Last » Next »