Sciweavers

1275 search results - page 7 / 255
» Are you having difficulty
Sort
View
ICISC
2004
108views Cryptology» more  ICISC 2004»
13 years 8 months ago
Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations
We consider the generation of prime order elliptic curves (ECs) over a prime field Fp using the Complex Multiplication (CM) method. A crucial step of this method is to compute the ...
Elisavet Konstantinou, Aristides Kontogeorgis, Yan...
SIGKDD
2010
183views more  SIGKDD 2010»
13 years 2 months ago
Inactive learning?: difficulties employing active learning in practice
Despite the tremendous level of adoption of machine learning techniques in real-world settings, and the large volume of research on active learning, active learning techniques hav...
Josh Attenberg, Foster J. Provost
SIGIR
2005
ACM
14 years 1 months ago
Predicting query difficulty on the web by learning visual clues
We describe a method for predicting query difficulty in a precision-oriented web search task. Our approach uses visual features from retrieved surrogate document representations (...
Eric C. Jensen, Steven M. Beitzel, David A. Grossm...
AAAI
2008
13 years 9 months ago
Examining Difficulties Software Developers Encounter in the Adoption of Statistical Machine Learning
Statistical machine learning continues to show promise as a tool for addressing complex problems in a variety of domains. An increasing number of developers are therefore looking ...
Kayur Patel, James Fogarty, James A. Landay, Bever...
CCS
2009
ACM
13 years 11 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...