Sciweavers

1991 search results - page 341 / 399
» Small Models of Large Machines
Sort
View
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
15 years 4 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
ELPUB
2006
ACM
15 years 3 months ago
What are the Prospects for Publishing Online Scholarly Journals in Malaysia? The Cultural Constraint
Most of the studies conducted on future business models for electronic scholarly publishing have concentrated on the major publishing areas of North America and Western Europe, an...
Jamay'ah Zakaria, Fytton Rowland
CP
2008
Springer
14 years 11 months ago
Elicitation Strategies for Fuzzy Constraint Problems with Missing Preferences: Algorithms and Experimental Studies
Fuzzy constraints are a popular approach to handle preferences and over-constrained problems in scenarios where one needs to be cautious, such as in medical or space applications. ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
HPDC
2010
IEEE
14 years 11 months ago
MOON: MapReduce On Opportunistic eNvironments
MapReduce offers a flexible programming model for processing and generating large data sets on dedicated resources, where only a small fraction of such resources are every unavaila...
Heshan Lin, Xiaosong Ma, Jeremy S. Archuleta, Wu-c...
AI
2010
Springer
14 years 10 months ago
Elicitation strategies for soft constraint problems with missing preferences: Properties, algorithms and experimental studies
We consider soft constraint problems where some of the preferences may be unspecified. This models, for example, settings where agents are distributed and have privacy issues, or ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...