Sciweavers

7742 search results - page 1422 / 1549
» The Robustness of Level Sets
Sort
View
GECCO
2005
Springer
156views Optimization» more  GECCO 2005»
15 years 6 months ago
Extraction of informative genes from microarray data
Identification of those genes that might anticipate the clinical behavior of different types of cancers is challenging due to availability of a smaller number of patient samples...
Topon Kumar Paul, Hitoshi Iba
UML
2005
Springer
15 years 6 months ago
Specifying Precise Use Cases with Use Case Charts
Use cases are a popular method for capturing and structuring software requirements. The informality of use cases is both a blessing and a curse. It enables easy application and lea...
Jon Whittle
ASPLOS
2004
ACM
15 years 6 months ago
An ultra low-power processor for sensor networks
We present a novel processor architecture designed specifically for use in low-power wireless sensor-network nodes. Our sensor network asynchronous processor (SNAP/LE) is based on...
Virantha N. Ekanayake, Clinton Kelly IV, Rajit Man...
75
Voted
SIGECOM
2004
ACM
96views ECommerce» more  SIGECOM 2004»
15 years 6 months ago
Expressive negotiation over donations to charities
When donating money to a (say, charitable) cause, it is possible to use the contemplated donation as negotiating material to induce other parties interested in the charity to dona...
Vincent Conitzer, Tuomas Sandholm
118
Voted
EUROCRYPT
2004
Springer
15 years 6 months ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
« Prev « First page 1422 / 1549 Last » Next »