Sciweavers

1734 search results - page 89 / 347
» What works
Sort
View
ISCI
2007
122views more  ISCI 2007»
13 years 9 months ago
On the strength of hyperclique patterns for text categorization
The use of association patterns for text categorization has attracted great interest and a variety of useful methods have been developed. However, the key characteristics of patte...
Tieyun Qian, Hui Xiong, Yuanzhen Wang, Enhong Chen
SYNTHESE
2010
68views more  SYNTHESE 2010»
13 years 7 months ago
Informational versus functional theories of scientific representation
Recent work in the philosophy of science has generated an apparent conflict between theories attempting to explicate the nature of scientific representation. On one side, there are...
Anjan Chakravartty
EDBTW
2010
Springer
13 years 7 months ago
A decision support system to improve e-learning environments
Nowadays, due to the lack of face-to-face contact, distance course instructors have real difficulties knowing who their students are, how their students behave in the virtual cour...
Marta E. Zorrilla, Diego García, Elena &Aac...
PAIRING
2010
Springer
149views Cryptology» more  PAIRING 2010»
13 years 7 months ago
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
Abstract. We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in s...
Dario Fiore, Rosario Gennaro, Nigel P. Smart
HOST
2009
IEEE
13 years 7 months ago
Experiences in Hardware Trojan Design and Implementation
Abstract-- We report our experiences in designing and implementing several hardware Trojans within the framework of the Embedded System Challenge competition that was held as part ...
Yier Jin, Nathan Kupp, Yiorgos Makris