Sciweavers

761 search results - page 121 / 153
» Metadata Principles and Practicalities
Sort
View
IJACT
2008
158views more  IJACT 2008»
15 years 2 months ago
Efficient lattice-based signature scheme
: In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece public key cryptosystem, in which security is related to the hardness of approximat...
Thomas Plantard, Willy Susilo, Khin Than Win, Qion...
CORR
2007
Springer
135views Education» more  CORR 2007»
15 years 2 months ago
The Unix KISS: A Case Study
In this paper we show that the initial philosophy used in designing and developing UNIX in early times has been forgotten due to “fast practices”. We question the leitmotif th...
Franco Milicchio
123
Voted
JMLR
2008
88views more  JMLR 2008»
15 years 2 months ago
Universal Multi-Task Kernels
In this paper we are concerned with reproducing kernel Hilbert spaces HK of functions from an input space into a Hilbert space Y, an environment appropriate for multi-task learnin...
Andrea Caponnetto, Charles A. Micchelli, Massimili...
NETWORK
2006
302views more  NETWORK 2006»
15 years 2 months ago
Node clustering in wireless sensor networks: recent developments and deployment challenges
The large-scale deployment of wireless sensor networks (WSNs) and the need for data aggregation necessitate efficient organization of the network topology for the purpose of balan...
Ossama Younis, Marwan Krunz, Srinivasan Ramasubram...
TIP
2008
208views more  TIP 2008»
15 years 2 months ago
Vision Processing for Realtime 3-D Data Acquisition Based on Coded Structured Light
Structured light vision systems have been successfully used for accurate measurement of 3-D surfaces in computer vision. However, their applications are mainly limited to scanning ...
S. Y. Chen, Y. F. Li, Jianwei Zhang