Sciweavers

1870 search results - page 353 / 374
» Content-Based Recommendation Systems
Sort
View
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
14 years 25 days ago
An Evaluation of Applying Use Cases to Construct Design versus Validate Design
Use case models capture and describe the functional requirements of a software system. A use case driven development process, where a use case model is the principal basis for con...
Erik Syversen, Bente Anda, Dag I. K. Sjøber...
IUI
2003
ACM
14 years 24 days ago
Personal choice point: helping users visualize what it means to buy a BMW
How do we know if we can afford a particular purchase? We can find out what the payments might be and check our balances on various accounts, but does this answer the question? Wh...
Andrew E. Fano, Scott W. Kurth
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
SIGCPR
1999
ACM
105views Hardware» more  SIGCPR 1999»
13 years 12 months ago
A university-based approach to the diffusion of knowledge management concepts and practice
This paper addresses the diffusion of Knowledge Management concepts, principles, and cases into university courses. Although we are now living in a world of gigabit transmission s...
Stephen Ruth, Jeffrey Theobald, Virgil Frizzell
IPPS
1999
IEEE
13 years 11 months ago
The Impact of Memory Hierarchies on Cluster Computing
Using off-the-shelf commodity workstations and PCs to build a cluster for parallel computing has become a common practice. A choice of a cost-effective cluster computing platform ...
Xing Du, Xiaodong Zhang