Sciweavers

629 search results - page 120 / 126
» Providing Justifications in Recommender Systems
Sort
View
GECCO
2007
Springer
308views Optimization» more  GECCO 2007»
14 years 1 months ago
Multiobjective clustering with automatic k-determination for large-scale data
Web mining - data mining for web data - is a key factor of web technologies. Especially, web behavior mining has attracted a great deal of attention recently. Behavior mining invo...
Nobukazu Matake, Tomoyuki Hiroyasu, Mitsunori Miki...
GLVLSI
2005
IEEE
144views VLSI» more  GLVLSI 2005»
14 years 1 months ago
On-chip power distribution grids with multiple supply voltages for high performance integrated circuits
—On-chip power distribution grids with multiple supply voltages are discussed in this paper. Two types of interdigitated and paired power distribution grids with multiple supply ...
Mikhail Popovich, Eby G. Friedman, Michael Sotman,...
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
SIGCPR
1999
ACM
105views Hardware» more  SIGCPR 1999»
13 years 12 months ago
A university-based approach to the diffusion of knowledge management concepts and practice
This paper addresses the diffusion of Knowledge Management concepts, principles, and cases into university courses. Although we are now living in a world of gigabit transmission s...
Stephen Ruth, Jeffrey Theobald, Virgil Frizzell
CCS
2009
ACM
13 years 11 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...