Sciweavers

1045 search results - page 62 / 209
» The Use of Exceptions
Sort
View
94
Voted
GROUP
2003
ACM
15 years 8 months ago
Process inheritance and instance modification
Process technologies play an increasingly important role as the world is being digitalized in nearly every corner. The major obstacles to their massive deployment include reusabil...
Guangxin Yang
128
Voted
EUROCRYPT
2009
Springer
16 years 3 months ago
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves
Abstract. Efficiently computable homomorphisms allow elliptic curve point multiplication to be accelerated using the Gallant-Lambert-Vanstone (GLV) method. Iijima, Matsuo, Chao and...
Steven D. Galbraith, Xibin Lin, Michael Scott
104
Voted
ECIS
2000
15 years 4 months ago
Leveraging Professional Intellect in the Virtual Age
The paper explores the nature of professional intellect and the requirements for managing it, an area acknowledged as being under-researched. Five case studies in the professional ...
Dieter Fink
139
Voted
ICFHR
2010
151views Biometrics» more  ICFHR 2010»
14 years 9 months ago
Error Reduction by Confusing Characters Discrimination for Online Handwritten Japanese Character Recognition
To reduce the classification errors of online handwritten Japanese character recognition, we propose a method for confusing characters discrimination with little additional costs....
Xiang-Dong Zhou, Da-Han Wang, Masaki Nakagawa, Che...
152
Voted
WSC
1997
15 years 4 months ago
Selective Rerouting Using Simulated Steady State System Data
Effective operational control of a manufacturing system that has routing flexibility is dependent upon being able to make informed real-time decisions in the event of a system dis...
Catherine M. Harmonosky, Robert H. Farr, Ming-Chua...