Sciweavers

224 search results - page 19 / 45
» The Second Life of ENIAC
Sort
View
SIGIR
2009
ACM
14 years 4 months ago
Brute force and indexed approaches to pairwise document similarity comparisons with MapReduce
This paper explores the problem of computing pairwise similarity on document collections, focusing on the application of “more like this” queries in the life sciences domain. ...
Jimmy J. Lin
IEEESCC
2005
IEEE
14 years 3 months ago
Transforming Business Process Models: Enabling Programming at a Higher Level
Two practical paradigms are presented, which facilitate domain concepts to be directly used to model business operations: the first paradigm is based on the business artifacts and...
Wei Zhao, Barrett R. Bryant, Fei Cao, Kamal Bhatta...
CCIA
2005
Springer
14 years 3 months ago
Modelling the Human Values Scale in Recommender Systems: A first approach
The objective of this paper is two-fold. The first is to develop a methodology capable of extracting the Human Values Scale (HVS) from the user, with reference to his/her objective...
Javier Guzmán, Gustavo González, Jos...
GECCO
2005
Springer
127views Optimization» more  GECCO 2005»
14 years 3 months ago
Identifying valid solutions for the inference of regulatory networks
In this paper, we address the problem of finding gene regulatory networks from experimental DNA microarray data. The problem often is multi-modal and therefore appropriate optimi...
Christian Spieth, Felix Streichert, Nora Speer, An...
CHES
2004
Springer
136views Cryptology» more  CHES 2004»
14 years 3 months ago
Attacking DSA Under a Repeated Bits Assumption
We discuss how to recover the private key for DSA style signature schemes if partial information about the ephemeral keys is revealed. The partial information we examine is of a se...
Peter J. Leadbitter, Dan Page, Nigel P. Smart