Sciweavers

7379 search results - page 70 / 1476
» How Many Clusters
Sort
View
WWW
2009
ACM
16 years 1 months ago
How opinions are received by online communities: a case study on amazon.com helpfulness votes
There are many on-line settings in which users publicly express opinions. A number of these offer mechanisms for other users to evaluate these opinions; a canonical example is Ama...
Cristian Danescu-Niculescu-Mizil, Gueorgi Kossinet...
ICDE
2007
IEEE
161views Database» more  ICDE 2007»
15 years 7 months ago
How to scalably and accurately skip past streams
Data stream methods look at each new item of the stream, perform a small number of operations while keeping a small amount of memory, and still perform muchneeded analyses. Howeve...
Supratik Bhattacharyya, André Madeira, S. M...
FDL
2007
IEEE
15 years 4 months ago
Transaction Level Modelling: A reflection on what TLM is and how TLMs may be classified
Transaction-level modelling (TLM) is a poorlyterm, promising a level of abstraction like RTL (register transfer level), where the key feature is a `transaction'. But unlike r...
Mark Burton, James Aldis, Robert Günzel, Wolf...
CTRSA
2007
Springer
146views Cryptology» more  CTRSA 2007»
15 years 7 months ago
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most s...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
109
Voted
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
15 years 4 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar