Sciweavers

15073 search results - page 2660 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
148
Voted
JUCS
2010
124views more  JUCS 2010»
15 years 3 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
167
Voted
WIOPT
2010
IEEE
15 years 2 months ago
Resource allocation for cross-layer utility maximization in multi-hop wireless networks in the presence of self interference
Abstract—The cross-layer utility maximization problem subject to stability constraints is considered for a multi-hop wireless network. A time slotted network, where the channel g...
Chathuranga Weeraddana, Marian Codreanu, Matti Lat...
ASSETS
2010
ACM
14 years 11 months ago
Broadening accessibility through special interests: a new approach for software customization
Individuals diagnosed with autism spectrum disorder (ASD) often fixate on narrow, restricted interests. These interests can be highly motivating, but they can also create attentio...
Robert R. Morris, Connor R. Kirschbaum, Rosalind W...
BMCBI
2011
14 years 11 months ago
Multiclass classification of microarray data samples with a reduced number of genes
Background: Multiclass classification of microarray data samples with a reduced number of genes is a rich and challenging problem in Bioinformatics research. The problem gets hard...
Elizabeth Tapia, Leonardo Ornella, Pilar Bulacio, ...
170
Voted
PVLDB
2011
14 years 11 months ago
Hyper-local, directions-based ranking of places
Studies find that at least 20% of web queries have local intent; and the fraction of queries with local intent that originate from mobile properties may be twice as high. The eme...
Petros Venetis, Hector Gonzalez, Christian S. Jens...
« Prev « First page 2660 / 3015 Last » Next »