Sciweavers

4761 search results - page 744 / 953
» Generalizing Boundary Points
Sort
View
ECML
2006
Springer
15 years 6 months ago
Cascade Evaluation of Clustering Algorithms
Abstract. This paper is about the evaluation of the results of clustering algorithms, and the comparison of such algorithms. We propose a new method based on the enrichment of a se...
Laurent Candillier, Isabelle Tellier, Fabien Torre...
DIM
2005
ACM
15 years 6 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
COCOA
2008
Springer
15 years 6 months ago
New Algorithms for k-Center and Extensions
The problem of interest is covering a given point set with homothetic copies of several convex containers C1,...,Ck, while the objective is to minimize the maximum over the dilatat...
René Brandenberg, Lucia Roth
DAC
2008
ACM
15 years 6 months ago
Technology exploration for graphene nanoribbon FETs
Graphene nanoribbon FETs (GNRFETs) are promising devices for beyond-CMOS nanoelectronics because of their excellent carrier transport properties and potential for large scale proc...
Mihir R. Choudhury, Youngki Yoon, Jing Guo, Kartik...
HT
2007
ACM
15 years 6 months ago
Experiments toward reverse linking on the web
Multi-headed reverse linking (incoming links) is a fundamental concept of Open Hypermedia Systems. However, this bi-directionality has been lost in the move to the World Wide Web ...
Yeliz Yesilada, Darren Lunn, Simon Harper