Sciweavers

699 search results - page 103 / 140
» mc 2008
Sort
View
124
Voted
IJACT
2008
158views more  IJACT 2008»
15 years 14 days ago
Efficient lattice-based signature scheme
: In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece public key cryptosystem, in which security is related to the hardness of approximat...
Thomas Plantard, Willy Susilo, Khin Than Win, Qion...
92
Voted
IJHPCA
2008
96views more  IJHPCA 2008»
15 years 14 days ago
BlueGene/L applications: Parallelism On a Massive Scale
pc.sagepub.com/cgi/content/abstract/22/1/33 The online version of this article can be found at: Published by: http://www.sagepublications.com can be found at:International Journal ...
Bronis R. de Supinski, Martin Schulz, Vasily Bulat...
JUCS
2008
115views more  JUCS 2008»
15 years 13 days ago
An Implementation of CLIM Presentation Types
: Presentation types are used in the CLIM interface library to tag graphical output with a type and establish an input type context in which the user may use the keyboard to type i...
Timothy Moore
JUCS
2008
134views more  JUCS 2008»
15 years 13 days ago
A Tool for Reasoning about Qualitative Temporal Information: the Theory of S-languages with a Lisp Implementation
: Reasoning about incomplete qualitative temporal information is an essential topic in many artificial intelligence and natural language processing applications. In the domain of n...
Irène Durand, Sylviane R. Schwer
101
Voted
KAIS
2008
79views more  KAIS 2008»
15 years 13 days ago
Top 10 algorithms in data mining
This paper presents the top 10 data mining algorithms identified by the IEEE International Conference on Data Mining (ICDM) in December 2006: C4.5, k-Means, SVM, Apriori, EM, Page...
Xindong Wu, Vipin Kumar, J. Ross Quinlan, Joydeep ...