Sciweavers

7865 search results - page 1544 / 1573
» Peer-to-Peer Data Management
Sort
View
CIT
2006
Springer
15 years 1 months ago
A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform
Hash functions play the most important role in various cryptologic applications, ranging from data integrity checking to digital signatures. Our goal is to introduce a new hash fu...
Barzan Mozafari, Mohammad Hasan Savoji
EELC
2006
156views Languages» more  EELC 2006»
15 years 1 months ago
The Human Speechome Project
The Human Speechome Project is an effort to observe and computationally model the longitudinal course of language development for a single child at an unprecedented scale. The ide...
Deb Roy, Rupal Patel, Philip DeCamp, Rony Kubat, M...
FSKD
2006
Springer
298views Fuzzy Logic» more  FSKD 2006»
15 years 1 months ago
Risk Assessment of E-Commerce Projects Using Evidential Reasoning
The purpose of this study is to develop a decision making system to evaluate the risks in E-Commerce (EC) projects. Competitive software businesses have the critical task of assess...
Rashid Hafeez Khokhar, David A. Bell, Jiwen Guan, ...
CIKM
2001
Springer
15 years 1 months ago
Sliding-Window Filtering: An Efficient Algorithm for Incremental Mining
We explore in this paper an effective sliding-window filtering (abbreviatedly as SWF) algorithm for incremental mining of association rules. In essence, by partitioning a transact...
Chang-Hung Lee, Cheng-Ru Lin, Ming-Syan Chen
ERCIMDL
2000
Springer
185views Education» more  ERCIMDL 2000»
15 years 1 months ago
CORC: Helping Libraries Take a Leading Role in the Digital Age
The OCLC Cooperative Online Resource Catalog is helping librarians thrive in the digital age. Librarians are using CORC to select, describe, maintain, and provide guided access to ...
Kay Covert
« Prev « First page 1544 / 1573 Last » Next »