Sciweavers

8655 search results - page 1368 / 1731
» Challenges for Trusted Computing
Sort
View
EDUTAINMENT
2008
Springer
15 years 5 months ago
Teaching Machine Learning to Design Students
Machine learning is a key technology to design and create intelligent systems, products, and related services. Like many other design departments, we are faced with the challenge t...
Bram van der Vlist, Rick van de Westelaken, Christ...
EDUTAINMENT
2008
Springer
15 years 5 months ago
Knowledge Discovery by Network Visualization
Hyperlinks among webpages are very important information and are widely used for webpage clustering and webpage ranking. With the explosive growth in the number of webpages availab...
Hong Zhou, Yingcai Wu, Ming-Yuen Chan, Huamin Qu, ...
EIT
2008
IEEE
15 years 5 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
EKAW
2008
Springer
15 years 5 months ago
E-Business Vocabularies as a Moving Target: Quantifying the Conceptual Dynamics in Domains
Most practically relevant domains include some degree of conceptual dynamics, i.e. new conceptual elements arise, and some old ones become irrelevant. This type of change imposes a...
Martin Hepp
166
Voted
ESEM
2008
ACM
15 years 5 months ago
A survey on software cost estimation in the chinese software industry
Although a lot of attention has been paid to software cost estimation since 1960, making accurate effort and schedule estimation is still a challenge. To collect evidence and iden...
Da Yang, Qing Wang, Mingshu Li, Ye Yang, Kai Ye, J...
« Prev « First page 1368 / 1731 Last » Next »