Sciweavers

2639 search results - page 405 / 528
» Pen Computing: Challenges and Applications
Sort
View
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
15 years 10 months ago
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Abstract. Wireless sensor networks have several useful applications in commercial and defense settings, as well as user-centric personal area networks. To establish secure (point-t...
Nitesh Saxena, Md. Borhan Uddin
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
15 years 10 months ago
Short and Stateless Signatures from the RSA Assumption
We present the first signature scheme which is “short”, stateless and secure under the RSA assumption in the standard model. Prior short, standard model signatures in the RSA...
Susan Hohenberger, Brent Waters
PKDD
2009
Springer
152views Data Mining» more  PKDD 2009»
15 years 10 months ago
Feature Selection for Value Function Approximation Using Bayesian Model Selection
Abstract. Feature selection in reinforcement learning (RL), i.e. choosing basis functions such that useful approximations of the unkown value function can be obtained, is one of th...
Tobias Jung, Peter Stone
KCAP
2009
ACM
15 years 10 months ago
Workflow matching using semantic metadata
Workflows are becoming an increasingly more common paradigm to manage scientific analyses. As workflow repositories start to emerge, workflow retrieval and discovery becomes a cha...
Yolanda Gil, Jihie Kim, Gonzalo Flórez Puga...
MM
2009
ACM
163views Multimedia» more  MM 2009»
15 years 10 months ago
CompositeMap: a novel music similarity measure for personalized multimodal music search
How to measure and model the similarity between different music items is one of the most fundamental yet challenging research problems in music information retrieval. This paper ...
Bingjun Zhang, Qiaoliang Xiang, Ye Wang, Jialie Sh...