Sciweavers

6881 search results - page 1358 / 1377
» Motivation
Sort
View
ISPEC
2011
Springer
12 years 10 months ago
Traitor Tracing against Public Collaboration
Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
Xingwen Zhao, Fangguo Zhang
JIS
2011
112views more  JIS 2011»
12 years 10 months ago
Classifying ecommerce information sharing behaviour by youths on social networking sites
Teenagers and young adults form an economically critical demographic group and are confronted with an array of internet social networking services just as they are forming online ...
Bernard J. Jansen, Kate Sobel, Geoff Cook
JOCN
2011
74views more  JOCN 2011»
12 years 10 months ago
Perception of Speech in Noise: Neural Correlates
■ The presence of irrelevant auditory information (other talkers, environmental noises) presents a major challenge to listening to speech. The fundamental frequency (F0) of the ...
Judy H. Song, Erika Skoe, Karen Banai, Nina Kraus
NAR
2011
225views Computer Vision» more  NAR 2011»
12 years 10 months ago
IsoBase: a database of functionally related proteins across PPI networks
We describe IsoBase, a database identifying functionally related proteins, across five major eukaryotic model organisms: Saccharomyces cerevisiae, Drosophila melanogaster, Caenorh...
Daniel Park, Rohit Singh, Michael Baym, Chung-Shou...
PEPM
2011
ACM
12 years 10 months ago
Adaptation-based programming in java
Writing deterministic programs is often difficult for problems whose optimal solutions depend on unpredictable properties of the programs’ inputs. Difficulty is also encounter...
Tim Bauer, Martin Erwig, Alan Fern, Jervis Pinto
« Prev « First page 1358 / 1377 Last » Next »