Sciweavers

3091 search results - page 393 / 619
» The Color Between Two Others
Sort
View
EUROCRYPT
2009
Springer
16 years 5 months ago
Verifiable Random Functions from Identity-Based Key Encapsulation
We propose a methodology to construct verifiable random functions from a class of identity based key encapsulation mechanisms (IB-KEM) that we call VRF suitable. Informally, an IB-...
Michel Abdalla, Dario Catalano, Dario Fiore
KDD
2006
ACM
149views Data Mining» more  KDD 2006»
16 years 5 months ago
Regularized discriminant analysis for high dimensional, low sample size data
Linear and Quadratic Discriminant Analysis have been used widely in many areas of data mining, machine learning, and bioinformatics. Friedman proposed a compromise between Linear ...
Jieping Ye, Tie Wang
KDD
2003
ACM
195views Data Mining» more  KDD 2003»
16 years 5 months ago
Visualizing changes in the structure of data for exploratory feature selection
Using visualization techniques to explore and understand high-dimensional data is an efficient way to combine human intelligence with the immense brute force computation power ava...
Elias Pampalk, Werner Goebl, Gerhard Widmer
VLSID
2008
IEEE
128views VLSI» more  VLSID 2008»
16 years 5 months ago
Addressing the Challenges of Synchronization/Communication and Debugging Support in Hardware/Software Cosimulation
With increasing adoption of Electronic System Level (ESL) tools, effective design and validation time has reduced to a considerable extent. Cosimulation is found to be a principal...
Banit Agrawal, Timothy Sherwood, Chulho Shin, Simo...
CHI
2003
ACM
16 years 5 months ago
The bull's-eye: a framework for web application user interface design guidelines
A multi-leveled framework for user interface design guidelines of Web applications is presented. User interface design guidelines tend to provide information that is either too ge...
Betsy Beier, Misha W. Vaughan