Sciweavers

1045 search results - page 62 / 209
» The Use of Exceptions
Sort
View
GROUP
2003
ACM
14 years 2 months ago
Process inheritance and instance modification
Process technologies play an increasingly important role as the world is being digitalized in nearly every corner. The major obstacles to their massive deployment include reusabil...
Guangxin Yang
EUROCRYPT
2009
Springer
14 years 10 months ago
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves
Abstract. Efficiently computable homomorphisms allow elliptic curve point multiplication to be accelerated using the Gallant-Lambert-Vanstone (GLV) method. Iijima, Matsuo, Chao and...
Steven D. Galbraith, Xibin Lin, Michael Scott
ECIS
2000
13 years 11 months ago
Leveraging Professional Intellect in the Virtual Age
The paper explores the nature of professional intellect and the requirements for managing it, an area acknowledged as being under-researched. Five case studies in the professional ...
Dieter Fink
ICFHR
2010
151views Biometrics» more  ICFHR 2010»
13 years 4 months ago
Error Reduction by Confusing Characters Discrimination for Online Handwritten Japanese Character Recognition
To reduce the classification errors of online handwritten Japanese character recognition, we propose a method for confusing characters discrimination with little additional costs....
Xiang-Dong Zhou, Da-Han Wang, Masaki Nakagawa, Che...
WSC
1997
13 years 11 months ago
Selective Rerouting Using Simulated Steady State System Data
Effective operational control of a manufacturing system that has routing flexibility is dependent upon being able to make informed real-time decisions in the event of a system dis...
Catherine M. Harmonosky, Robert H. Farr, Ming-Chua...