Sciweavers

11588 search results - page 2253 / 2318
» Will They Like This
Sort
View
JUCS
2010
124views more  JUCS 2010»
13 years 7 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
JUCS
2010
183views more  JUCS 2010»
13 years 7 months ago
User Context and Personalized Learning: a Federation of Contextualized Attention Metadata
: Nowadays, personalized education is a very hot topic in technology enhanced learning (TEL) research. To support students during their learning process, the first step consists in...
Valentin Butoianu, Philippe Vidal, Katrien Verbert...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 7 months ago
Scalable similarity search with optimized kernel hashing
Scalable similarity search is the core of many large scale learning or data mining applications. Recently, many research results demonstrate that one promising approach is creatin...
Junfeng He, Wei Liu, Shih-Fu Chang
LICS
2010
IEEE
13 years 7 months ago
Polarity and the Logic of Delimited Continuations
Abstract—Polarized logic is the logic of values and continuations, and their interaction through continuation-passing style. The main limitations of this logic are the limitation...
Noam Zeilberger
MANSCI
2010
105views more  MANSCI 2010»
13 years 7 months ago
Revenue Management with Strategic Customers: Last-Minute Selling and Opaque Selling
Companies in a variety of industries (e.g., airlines, hotels, theaters) often use last-minute sales to dispose of unsold capacity. Although this may generate incremental revenues ...
Kinshuk Jerath, Serguei Netessine, Senthil K. Veer...
« Prev « First page 2253 / 2318 Last » Next »