Sciweavers

18898 search results - page 3753 / 3780
» The Making of a Software Engineer
Sort
View
CHES
2008
Springer
134views Cryptology» more  CHES 2008»
14 years 12 months ago
Ultra High Performance ECC over NIST Primes on Commercial FPGAs
Elliptic Curve Cryptosystems (ECC) have gained increasing acceptance in practice due to their significantly smaller bit size of the operands compared to other public-key cryptosyst...
Tim Güneysu, Christof Paar
CIKM
2008
Springer
14 years 12 months ago
Non-local evidence for expert finding
The task addressed in this paper, finding experts in an enterprise setting, has gained in importance and interest over the past few years. Commonly, this task is approached as an ...
Krisztian Balog, Maarten de Rijke
CIKM
2008
Springer
14 years 12 months ago
Learning a two-stage SVM/CRF sequence classifier
Learning a sequence classifier means learning to predict a sequence of output tags based on a set of input data items. For example, recognizing that a handwritten word is "ca...
Guilherme Hoefel, Charles Elkan
ATAL
2006
Springer
14 years 12 months ago
On proactivity and maintenance goals
Goals are an important concept in intelligent agent systems, and can take a variety of forms. One such form is maintenance goals, which, unlike achievement goals, define states th...
Simon Duff, James Harland, John Thangarajah
HT
2010
ACM
14 years 12 months ago
Capturing implicit user influence in online social sharing
Online social sharing sites are becoming very popular nowadays among Web users, who use these sites to share their favourite items and to discover interesting and useful items fro...
Ching-man Au Yeung, Tomoharu Iwata
« Prev « First page 3753 / 3780 Last » Next »