Sciweavers

1027 search results - page 195 / 206
» Opening Up The Enterprise
Sort
View
COMPSEC
2004
131views more  COMPSEC 2004»
14 years 11 months ago
Biometric random number generators
Abstract Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to use biological data for generating sequences of random ...
Janusz Szczepanski, Elek Wajnryb, José M. A...
CSCW
2004
ACM
14 years 11 months ago
Domestic Routines and Design for the Home
The domestic environment is predicted by market analysts to be the major growth area in computing over the next decade, yet it is a poorly understood domain at the current time of...
Andy Crabtree, Tom Rodden
CACM
2000
130views more  CACM 2000»
14 years 11 months ago
Visual Generalization in Programming by Example
In Programming by Example [PBE, also sometimes called "Programming by Demonstration"] systems, the system records actions performed by a user in the interface, and produ...
Robert St. Amant, Henry Lieberman, Richard Potter,...
IM
2007
14 years 11 months ago
Cluster Generation and Labeling for Web Snippets: A Fast, Accurate Hierarchical Solution
This paper describes Armil, a meta-search engine that groups the web snippets returned by auxiliary search engines into disjoint labeled clusters. The cluster labels generated by A...
Filippo Geraci, Marco Pellegrini, Marco Maggini, F...
COMBINATORICS
1998
99views more  COMBINATORICS 1998»
14 years 11 months ago
Constructions for Cubic Graphs with Large Girth
The aim of this paper is to give a coherent account of the problem of constructing cubic graphs with large girth. There is a well-defined integer µ0(g), the smallest number of v...
Norman Biggs