Sciweavers

2639 search results - page 518 / 528
» Pen Computing: Challenges and Applications
Sort
View
CHES
2008
Springer
134views Cryptology» more  CHES 2008»
14 years 12 days ago
Ultra High Performance ECC over NIST Primes on Commercial FPGAs
Elliptic Curve Cryptosystems (ECC) have gained increasing acceptance in practice due to their significantly smaller bit size of the operands compared to other public-key cryptosyst...
Tim Güneysu, Christof Paar
MIE
2008
128views Healthcare» more  MIE 2008»
13 years 11 months ago
Interface Terminologies: Bridging the Gap between Theory and Reality for Africa
In the United States and Europe, electronic health records (EHRs) allow information technology and decision-support to facilitate the activities of clinicians and are considered a...
Andrew S. Kanter, Amy Y. Wang, Fred E. Masarie Jr....
SDM
2007
SIAM
131views Data Mining» more  SDM 2007»
13 years 11 months ago
Load Shedding in Classifying Multi-Source Streaming Data: A Bayes Risk Approach
In many applications, we monitor data obtained from multiple streaming sources for collective decision making. The task presents several challenges. First, data in sensor networks...
Yijian Bai, Haixun Wang, Carlo Zaniolo
FECS
2006
125views Education» more  FECS 2006»
13 years 11 months ago
An Automated Template Based Interactive Multimedia Solution for Handheld Devices in the Educational Field or Other Domains
The recent enormous increase in the availability of mobile devices such as phones, PDAs, webpads, tablet PCs etc. and with it the corresponding demand for interactive multimedia a...
Oszkar Nagy, Allen Long
ACL
1997
13 years 11 months ago
A Theory of Parallelism and the Case of VP Ellipsis
We provide a general account of parallelism in discourse, and apply it to the special case of resolving possible readings for instances of VP ellipsis. We show how several problem...
Jerry R. Hobbs, Andrew Kehler