Sciweavers

1610 search results - page 275 / 322
» Identity Based Multisignatures
Sort
View
JMLR
2006
93views more  JMLR 2006»
13 years 9 months ago
An Efficient Implementation of an Active Set Method for SVMs
We propose an active set algorithm to solve the convex quadratic programming (QP) problem which is the core of the support vector machine (SVM) training. The underlying method is ...
Katya Scheinberg
ENVSOFT
2007
88views more  ENVSOFT 2007»
13 years 9 months ago
Resampling-based software for estimating optimal sample size
The SISSI program implements a novel approach for the estimation of the optimal sample size in experimental data collection. It provides avisual evaluation system of sample size d...
Roberto Confalonieri, Marco Acutis, Gianni Bellocc...
FUIN
2007
147views more  FUIN 2007»
13 years 9 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
PUC
2006
89views more  PUC 2006»
13 years 9 months ago
Using ubiquitous computing in interactive mobile marketing
Unique features of handheld devices, including their mobility, personalization and location-awareness engender new types of applications for mobile commerce, such as mobile adverti...
Stan Kurkovsky, Karthik Harihar
SIGCSE
2008
ACM
132views Education» more  SIGCSE 2008»
13 years 9 months ago
A case study of retention practices at the University of Illinois at Urbana-Champaign
Computer science is seeing a decline in enrollment at all levels of education. One key strategy for reversing this decline is to improve methods of student retention. This paper, ...
Tanya L. Crenshaw, Erin W. Chambers, Heather Metca...