Sciweavers

6770 search results - page 432 / 1354
» How GPUs Work
Sort
View
ICICS
2009
Springer
15 years 11 months ago
Biometric-Based Non-transferable Anonymous Credentials
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
Marina Blanton, William M. P. Hudelson
IMA
2009
Springer
152views Cryptology» more  IMA 2009»
15 years 11 months ago
Double-Exponentiation in Factor-4 Groups and Its Applications
In previous work we showed how to compress certain prime-order subgroups of the cyclotomic subgroups of orders 22m + 1 of the multiplicative groups of F∗ 24m by a factor of 4. We...
Koray Karabina
PKDD
2009
Springer
110views Data Mining» more  PKDD 2009»
15 years 11 months ago
Using Temporal Language Models for Document Dating
Abstract. In order to increase precision in searching for web pages or web documents, taking the temporal dimension into account is gaining increased interest. A particular problem...
Nattiya Kanhabua, Kjetil Nørvåg
PREMI
2009
Springer
15 years 11 months ago
Data Mining by Navigation - An Experience with Systems Biology
This paper proposes a navigational method for mining by collecting evidences from diverse data sources. Since the representation method and even semantics of data elements differ w...
Amarnath Gupta, Michael Baitaluk, Animesh Ray, Adi...
QI
2009
Springer
130views Physics» more  QI 2009»
15 years 11 months ago
Eraser Lattices and Semantic Contents
A novel way to define Quantum like measurements for text is through transformations called Selective Erasers. When applied to text, an Eraser acts like a filter and preserves par...
Alvaro Francisco Huertas-Rosero, Leif Azzopardi, C...