Sciweavers

2403 search results - page 440 / 481
» Using the WinWin Spiral Model: A Case Study
Sort
View
TCC
2009
Springer
184views Cryptology» more  TCC 2009»
15 years 11 months ago
Secure Arithmetic Computation with No Honest Majority
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case o...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
CSEE
2000
Springer
15 years 3 months ago
Technology Transfer Issues for Formal Methods of Software Specification
Accurate and complete requirements specifications are crucial for the design and implementation of high-quality software. Unfortunately, the articulation and verification of softw...
Ken Abernethy, John C. Kelly, Ann E. Kelley Sobel,...
ECIS
2004
15 years 19 days ago
Beyond Knowledge Management - Introducing a framework for Learning Management Systems
In the knowledge economy, a firm's intellectual capital represents the only sustainable source of competitive advantage. Intellectual capital manifests itself, predominantly,...
Audrey Dunne, Tom Butler
TCOM
2010
109views more  TCOM 2010»
14 years 9 months ago
Results on Finite Wireless Networks on a Line
Abstract— Today, due to the vast amount of literature on largescale wireless networks, we have a fair understanding of the asymptotic behavior of such networks. However, in real ...
Ali Eslami, Mohammad Nekoui, Hossein Pishro-Nik
BMCBI
2010
165views more  BMCBI 2010»
14 years 11 months ago
Filtering, FDR and power
Background: In high-dimensional data analysis such as differential gene expression analysis, people often use filtering methods like fold-change or variance filters in an attempt ...
Maarten van Iterson, Judith M. Boer, Renée ...