Sciweavers

362 search results - page 48 / 73
» Making the Most of Cache Groups
Sort
View
JCDL
2005
ACM
127views Education» more  JCDL 2005»
15 years 3 months ago
Assessing tools for use with webcasts
This research assessed the effectiveness of selected interface tools in helping people respond to classic information tasks with webcasts. Rather than focus on a classic search/br...
Elaine G. Toms, Christine Dufour, Jonathan Lewis, ...
ESORICS
2005
Springer
15 years 3 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
ICS
2005
Tsinghua U.
15 years 3 months ago
Parallel sparse LU factorization on second-class message passing platforms
Several message passing-based parallel solvers have been developed for general (non-symmetric) sparse LU factorization with partial pivoting. Due to the fine-grain synchronizatio...
Kai Shen
WECWIS
2003
IEEE
128views ECommerce» more  WECWIS 2003»
15 years 3 months ago
PCFinder: An Intelligent Product Recommendation Agent for E-Commerce
There are many e-commerce applications on the web. A common shortcoming is the lack of customer service and marketing analysis tools in most ecommerce web sites. In order to overc...
Bin Xiao, Esma Aïmeur, José Manuel Fer...
COMPSAC
2009
IEEE
15 years 2 months ago
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
—Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always bee...
Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Moham...