Sciweavers

3735 search results - page 588 / 747
» Order compression schemes
Sort
View
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
16 years 1 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay
KDD
2008
ACM
120views Data Mining» more  KDD 2008»
16 years 1 months ago
Multi-class cost-sensitive boosting with p-norm loss functions
We propose a family of novel cost-sensitive boosting methods for multi-class classification by applying the theory of gradient boosting to p-norm based cost functionals. We establ...
Aurelie C. Lozano, Naoki Abe
KDD
2002
ACM
169views Data Mining» more  KDD 2002»
16 years 1 months ago
A Framework for Customizable Sports Video Management and Retrieval
Several domain specific approaches for sports video management have shown the benefits of integrating low- and high- level video contents in supporting more robust retrieval. Howev...
Dian Tjondronegoro, Yi-Ping Phoebe Chen, Binh Pham
CHI
2007
ACM
16 years 1 months ago
Patterns of empathy in online communication
This article presents an investigation of empathy within an online community for older people (SeniorNet). Qualitative content analysis of 400 messages from a discussion board abo...
Ulrike Pfeil, Panayiotis Zaphiris
83
Voted
CHI
2006
ACM
16 years 1 months ago
"LINC-ing" the family: the participatory design of an inkable family calendar
Families must continually organize, plan, and stay aware of the activities of their households in order to coordinate everyday life. Despite having organization schemes, many peop...
Carman Neustaedter, A. J. Bernheim Brush