Sciweavers

755 search results - page 18 / 151
» ideas 2005
Sort
View
KES
2005
Springer
15 years 3 months ago
Natural Storage in Human Body
We propose using the human body for “storing” data used in devices for the imminent ubiquitous computing era. In the future, people will use information appliances as powerful ...
Shigaku Iwabuchi, Buntarou Shizuki, Kazuo Misue, J...
KES
2005
Springer
15 years 3 months ago
Enhancing Computer Chat: Toward a Smooth User-Computer Interaction
Abstract. Human-computer interaction (HCI) has fundamentally changed computing. The ubiquity of HCI can be seen in several kinds of application areas, such as text editing, hyperte...
Calkin A. S. Montero, Kenji Araki
LPAR
2005
Springer
15 years 3 months ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...
LPNMR
2005
Springer
15 years 3 months ago
An Algebraic Account of Modularity in ID-Logic
ID-logic uses ideas from the field of logic programming to extend second order logic with non-monotone inductive defintions. In this work, we reformulate the semantics of this lo...
Joost Vennekens, Marc Denecker
82
Voted
MCS
2005
Springer
15 years 3 months ago
Which Is the Best Multiclass SVM Method? An Empirical Study
Abstract. Multiclass SVMs are usually implemented by combining several two-class SVMs. The one-versus-all method using winner-takes-all strategy and the one-versus-one method imple...
Kaibo Duan, S. Sathiya Keerthi