Sciweavers

3389 search results - page 576 / 678
» Perspectives on system identification
Sort
View
GROUP
2007
ACM
14 years 1 months ago
Supporting creativity with awareness in distributed collaboration
Based on qualitative analysis of three groups collaborating on a research task in a distributed setting, we identify four breakdowns in creativity: (1) Minority ideas were under-c...
Umer Farooq, John M. Carroll, Craig H. Ganoe
HIPC
2007
Springer
14 years 1 months ago
Accomplishing Approximate FCFS Fairness Without Queues
First Come First Served (FCFS) is a policy that is accepted for implementing fairness in a number of application domains such as scheduling in Operating Systems, scheduling web req...
K. Subramani, Kamesh Madduri
ICAIL
2007
ACM
14 years 1 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
SIGIR
2010
ACM
14 years 1 months ago
Probabilistic latent maximal marginal relevance
Diversity has been heavily motivated in the information retrieval literature as an objective criterion for result sets in search and recommender systems. Perhaps one of the most w...
Shengbo Guo, Scott Sanner
ANTS
2004
Springer
103views Algorithms» more  ANTS 2004»
14 years 1 months ago
A Comparison of CEILIDH and XTR
We give a comparison of the performance of the recently proposed torus-based public key cryptosystem CEILIDH, and XTR. Underpinning both systems is the mathematics of the two dimen...
Robert Granger, Dan Page, Martijn Stam