Sciweavers

17789 search results - page 3501 / 3558
» Exceptional Use Cases
Sort
View
EXPERT
2006
156views more  EXPERT 2006»
13 years 7 months ago
Computational Models of Ethical Reasoning: Challenges, Initial Steps, and Future Directions
on abstract principles that you can't easily apply in a formal, deductive fashion. So, the favorite tools of logicians and mathematicians, such as firstorder logic, aren'...
Bruce M. McLaren
FUIN
2006
98views more  FUIN 2006»
13 years 7 months ago
On-line Approximate String Matching in Natural Language
We consider approximate pattern matching in natural language text. We use the words of the text as the alphabet, instead of the characters as in traditional string matching approac...
Kimmo Fredriksson
CEE
2007
110views more  CEE 2007»
13 years 7 months ago
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
It is a challenge to implement large word length public-key algorithms on embedded systems. Examples are smartcards, RF-ID tags and mobile terminals. This paper presents a HW/SW c...
Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid...
CGA
2007
13 years 7 months ago
From Abstract Painting to Information Visualization
abstract painting and practice can benefit information visualization—even though the two fields have significantly different objectives. This comparison reflects the spirit of ...
Kang Zhang
IJSNET
2008
118views more  IJSNET 2008»
13 years 7 months ago
Public key cryptography empowered smart dust is affordable
: Public key cryptography (PKC) has been considered for a long time to be computationally too expensive for small battery powered devices. However, PKC turned out to be very benefi...
Steffen Peter, Peter Langendörfer, Krzysztof ...
« Prev « First page 3501 / 3558 Last » Next »