Sciweavers

95 search results - page 14 / 19
» Risk assessment in distributed authorization
Sort
View
BIRTHDAY
2012
Springer
12 years 3 months ago
Deniable RSA Signature - The Raise and Fall of Ali Baba
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evi...
Serge Vaudenay
ERCIMDL
2005
Springer
124views Education» more  ERCIMDL 2005»
14 years 27 days ago
A Comparison of On-Line Computer Science Citation Databases
This paper examines the difference and similarities between the two on-line computer science citation databases DBLP and CiteSeer. The database entries in DBLP are inserted manual...
Vaclav Petricek, Ingemar J. Cox, Hui Han, Isaac G....
KDD
2010
ACM
310views Data Mining» more  KDD 2010»
13 years 11 months ago
An integrated machine learning approach to stroke prediction
Stroke is the third leading cause of death and the principal cause of serious long-term disability in the United States. Accurate prediction of stroke is highly valuable for early...
Aditya Khosla, Yu Cao, Cliff Chiung-Yu Lin, Hsu-Ku...
ML
2006
ACM
109views Machine Learning» more  ML 2006»
13 years 7 months ago
Cost curves: An improved method for visualizing classifier performance
Abstract This paper introduces cost curves, a graphical technique for visualizing the performance (error rate or expected cost) of 2-class classifiers over the full range of possib...
Chris Drummond, Robert C. Holte
TIM
2010
139views Education» more  TIM 2010»
13 years 2 months ago
A Design Approach For Digital Controllers Using Reconfigurable Network-Based Measurements
In this paper, the authors propose and analyze a network-based control architecture for power-electronicsbuilding-block-based converters. The objective of the proposed approach is ...
Rong Liu, Antonello Monti, Ferdinanda Ponci, Anton...