Sciweavers

329 search results - page 52 / 66
» A Survey of Lightweight-Cryptography Implementations
Sort
View
ANLP
1994
73views more  ANLP 1994»
13 years 9 months ago
Understanding Location Descriptions in the LEI System
Biological specimens have historicallybeen labeled with English descriptions of the location of collection. To perform spatial, statistical, or historic studies, these description...
David N. Chin, Matthew McGranaghan, Tung-Tse Chen
WCE
2007
13 years 8 months ago
A Dynamic Method for the Evaluation and Comparison of Imputation Techniques
— Imputation of missing data is important in many areas, such as reducing non-response bias in surveys and maintaining medical documentation. Estimating the uncertainty inherent ...
Norman Solomon, Giles Oatley, Kenneth McGarry
CCS
2010
ACM
13 years 7 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
EOR
2008
116views more  EOR 2008»
13 years 7 months ago
A hybrid neuro-fuzzy analytical approach to mode choice of global logistics management
This paper presents a hybrid neuro-fuzzy methodology to identify appropriate global logistics (GL) operational modes used for global supply chain management. The proposed methodol...
Jiuh-Biing Sheu
FUIN
2006
95views more  FUIN 2006»
13 years 7 months ago
Multistrategy Operators for Relational Learning and Their Cooperation
Traditional Machine Learning approaches based on single inference mechanisms have reached their limits. This causes the need for a framework that integrates approaches based on aba...
Floriana Esposito, Nicola Fanizzi, Stefano Ferilli...