Sciweavers

1679 search results - page 280 / 336
» Evaluation by comparing result sets in context
Sort
View
HICSS
2002
IEEE
140views Biometrics» more  HICSS 2002»
14 years 18 days ago
Intelligent Student Profiling with Fuzzy Models
Traditional Web-based educational systems still have several shortcomings when comparing with a real-life classroom teaching, such as lack of contextual and adaptive support, lack...
Dongming Xu, Huaiqing Wang, Kaile Su
NGC
2000
Springer
125views Communications» more  NGC 2000»
13 years 11 months ago
A multicast-based protocol for IP mobility support
Several architectures have been recently proposed to support IP mobility. Most studies, however, show that current protocols, in general, fall short from satisfying the performanc...
Ahmed Helmy
CF
2005
ACM
13 years 9 months ago
Controlling leakage power with the replacement policy in slumberous caches
As technology scales down at an exponential rate, leakage power is fast becoming the dominant component of the total power budget. A large share of the total leakage power is diss...
Nasir Mohyuddin, Rashed Bhatti, Michel Dubois
BMCBI
2004
144views more  BMCBI 2004»
13 years 7 months ago
GOtcha: a new method for prediction of protein function assessed by the annotation of seven genomes
Background: The function of a novel gene product is typically predicted by transitive assignment of annotation from similar sequences. We describe a novel method, GOtcha, for pred...
David M. A. Martin, Matthew Berriman, Geoffrey J. ...
ASIACRYPT
2010
Springer
13 years 5 months ago
The World Is Not Enough: Another Look on Second-Order DPA
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysi...
François-Xavier Standaert, Nicolas Veyrat-C...