Sciweavers

1210 search results - page 216 / 242
» Specifying Precise Use Cases with Use Case Charts
Sort
View
ASIACRYPT
2010
Springer
15 years 2 months ago
Lattice-Based Blind Signatures
Blind signatures (BS), introduced by Chaum, have become a cornerstone in privacy-oriented cryptography. Using hard lattice problems, such as the shortest vector problem, as the bas...
Markus Rückert
ICWS
2010
IEEE
15 years 2 months ago
An Approach for Context-Aware Service Discovery and Recommendation
Given the large amount of existing services and the diversified needs nowadays, it is time-consuming for end-users to find appropriate services. To help end-users obtain their desi...
Hua Xiao, Ying Zou, Joanna Ng, Leho Nigul
CC
2011
Springer
270views System Software» more  CC 2011»
14 years 7 months ago
Subregion Analysis and Bounds Check Elimination for High Level Arrays
For decades, the design and implementation of arrays in programming languages has reflected a natural tension between productivity and performance. Recently introduced HPCS langua...
Mackale Joyner, Zoran Budimlic, Vivek Sarkar
KDD
2012
ACM
179views Data Mining» more  KDD 2012»
13 years 6 months ago
Transparent user models for personalization
Personalization is a ubiquitous phenomenon in our daily online experience. While such technology is critical for helping us combat the overload of information we face, in many cas...
Khalid El-Arini, Ulrich Paquet, Ralf Herbrich, Jur...
TEC
2012
197views Formal Methods» more  TEC 2012»
13 years 6 months ago
Improving Generalization Performance in Co-Evolutionary Learning
Recently, the generalization framework in co-evolutionary learning has been theoretically formulated and demonstrated in the context of game-playing. Generalization performance of...
Siang Yew Chong, Peter Tino, Day Chyi Ku, Xin Yao