Sciweavers

859 search results - page 117 / 172
» Implementing CMMI using a Combination of Agile Methods
Sort
View
117
Voted
MM
2005
ACM
108views Multimedia» more  MM 2005»
15 years 9 months ago
uPen: laser-based, personalized, multi-user interaction on large displays
We present the uPen, a laser pointer combined with a contactpushed switch, three press buttons and a wireless communication module. This novel interaction device allows users to i...
Xiaojun Bi, Yuanchun Shi, Xiaojie Chen, Peifeng Xi...
123
Voted
GECCO
2004
Springer
15 years 9 months ago
On Multi-class Classification by Way of Niching
In recent literature, the niche enabling effects of crowding and the sharing algorithms have been systematically investigated in the context of Genetic Algorithms and are now estab...
Andrew R. McIntyre, Malcolm I. Heywood
CLUSTER
2002
IEEE
15 years 9 months ago
Noncontiguous I/O through PVFS
With the tremendous advances in processor and memory technology, I/O has risen to become the bottleneck in high-performance computing for many applications. The development of par...
Avery Ching, Alok N. Choudhary, Wei-keng Liao, Rob...
SEMWEB
2009
Springer
15 years 8 months ago
DOGMA: A Disk-Oriented Graph Matching Algorithm for RDF Databases
RDF is an increasingly important paradigm for the representation of information on the Web. As RDF databases increase in size to approach tens of millions of triples, and as sophis...
Matthias Bröcheler, Andrea Pugliese, V. S. Su...
EUROCRYPT
2001
Springer
15 years 8 months ago
Finding Secure Curves with the Satoh-FGH Algorithm and an Early-Abort Strategy
The use of elliptic curves in cryptography relies on the ability to count the number of points on a given curve. Before 1999, the SEA algorithm was the only efficient method known ...
Mireille Fouquet, Pierrick Gaudry, Robert Harley