Sciweavers

1610 search results - page 300 / 322
» Identity Based Multisignatures
Sort
View
WWW
2010
ACM
14 years 3 months ago
Exploiting social context for review quality prediction
Online reviews in which users publish detailed commentary about their experiences and opinions with products, services, or events are extremely valuable to users who rely on them ...
Yue Lu, Panayiotis Tsaparas, Alexandros Ntoulas, L...
HICSS
2010
IEEE
193views Biometrics» more  HICSS 2010»
14 years 3 months ago
The Topological and Electrical Structure of Power Grids
Numerous recent papers have found important relationships between network structure and risks within networks. These results indicate that network structure can dramatically affec...
Paul Hines, Seth Blumsack, E. Cotilla Sanchez, C. ...
TEI
2010
ACM
106views Hardware» more  TEI 2010»
14 years 3 months ago
Towards tabletop interaction with everyday artifacts via pressure imaging
Tangible user interfaces enable the interaction with digital information through the physical world. For the binding of physical representations with the underlying digital inform...
Clemens Holzmann, Andreas Hader
KDD
2009
ACM
193views Data Mining» more  KDD 2009»
14 years 3 months ago
Category detection using hierarchical mean shift
Many applications in surveillance, monitoring, scientific discovery, and data cleaning require the identification of anomalies. Although many methods have been developed to iden...
Pavan Vatturi, Weng-Keen Wong
CSE
2009
IEEE
14 years 3 months ago
On the Design of a Suitable Hardware Platform for Protocol Stack Processing in LTE Terminals
—In this paper we present a design methodology for the identification and development of a suitable hardware platform (including dedicated hardware accelerators) for the data pl...
Sebastian Hessel, David Szczesny, Shadi Traboulsi,...