Sciweavers

1104 search results - page 211 / 221
» A Comparison of State-Based Modelling Tools for Model Valida...
Sort
View
KDD
2006
ACM
122views Data Mining» more  KDD 2006»
14 years 9 months ago
Tensor-CUR decompositions for tensor-based data
Motivated by numerous applications in which the data may be modeled by a variable subscripted by three or more indices, we develop a tensor-based extension of the matrix CUR decom...
Michael W. Mahoney, Mauro Maggioni, Petros Drineas
EUROSYS
2006
ACM
14 years 5 months ago
Ferret: a toolkit for content-based similarity search of feature-rich data
Building content-based search tools for feature-rich data has been a challenging problem because feature-rich data such as audio recordings, digital images, and sensor data are in...
Qin Lv, William Josephson, Zhe Wang, Moses Charika...
FDTC
2009
Springer
126views Cryptology» more  FDTC 2009»
14 years 3 months ago
WDDL is Protected against Setup Time Violation Attacks
—In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful t...
Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Ta...
ESWS
2007
Springer
14 years 2 months ago
Annotating Relationships Between Multiple Mixed-Media Digital Objects by Extending Annotea
Annotea provides an annotation protocol to support collaborative Semantic Web-based annotation of digital resources accessible through the Web. It provides a model whereby a user m...
Ronald Schroeter, Jane Hunter, Andrew Newman
ITICSE
2004
ACM
14 years 2 months ago
What do we mean by theoretically sound research in computer science education?
With our interest to improve our education in computer science, an understanding of how students learn about CS concepts, how different concepts are understood, as well as the con...
Mordechai Ben-Ari, Anders Berglund, Shirley Booth,...