Sciweavers

1010 search results - page 130 / 202
» Designing Then and Now
Sort
View
ICISC
2008
123views Cryptology» more  ICISC 2008»
15 years 23 days ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
LREC
2008
85views Education» more  LREC 2008»
15 years 23 days ago
Construction of a Metadata Database for Efficient Development and Use of Language Resources
The National Institute of Information and Communications Technology (NICT) and Nagoya University have been jointly constructing a large scale database named SHACHI by collecting d...
Hitomi Tohyama, Shunsuke Kozawa, Kiyotaka Uchimoto...
AAAI
2004
15 years 22 days ago
CMRadar: A Personal Assistant Agent for Calendar Management
Abstract. Personal assistant agents have long promised to automate routine everyday tasks in order to reduce the cognitive load on humans. One such routine task is the management o...
Pragnesh Jay Modi, Manuela M. Veloso, Stephen F. S...
AAAI
2006
15 years 22 days ago
Efficient L1 Regularized Logistic Regression
L1 regularized logistic regression is now a workhorse of machine learning: it is widely used for many classification problems, particularly ones with many features. L1 regularized...
Su-In Lee, Honglak Lee, Pieter Abbeel, Andrew Y. N...
BIOCOMP
2006
15 years 22 days ago
Finishing Repetitive Regions Automatically with Dupfinisher
Currently, the genome sequencing community is producing shotgun sequence data at a very high rate, but genome finishing is not keeping pace, even with the help from several automa...
Cliff Han, Patrick Chain