Sciweavers

42 search results - page 3 / 9
» Only valuable experts can be valued
Sort
View
ISN
1998
Springer
15 years 1 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
ISQED
2010
IEEE
137views Hardware» more  ISQED 2010»
15 years 2 months ago
Automated silicon debug data analysis techniques for a hardware data acquisition environment
Abstract—Silicon debug poses a unique challenge to the engineer because of the limited access to internal signals of the chip. Embedded hardware such as trace buffers helps overc...
Yu-Shen Yang, Brian Keng, Nicola Nicolici, Andreas...
CANDC
2009
ACM
15 years 4 months ago
Discovery is never by chance: designing for (un)serendipity
Serendipity has a long tradition in the history of science as having played a key role in many significant discoveries. Computer scientists, valuing the role of serendipity in dis...
Paul André, m. c. schraefel, Jaime Teevan, ...
ATAL
2008
Springer
14 years 11 months ago
Graph Laplacian based transfer learning in reinforcement learning
The aim of transfer learning is to accelerate learning in related domains. In reinforcement learning, many different features such as a value function and a policy can be transfer...
Yi-Ting Tsao, Ke-Ting Xiao, Von-Wun Soo
BMCBI
2006
134views more  BMCBI 2006»
14 years 9 months ago
Application of machine learning in SNP discovery
Background: Single nucleotide polymorphisms (SNP) constitute more than 90% of the genetic variation, and hence can account for most trait differences among individuals in a given ...
Lakshmi K. Matukumalli, John J. Grefenstette, Davi...