Sciweavers

892 search results - page 84 / 179
» et 2007
Sort
View
DAWAK
2007
Springer
14 years 3 months ago
Mining Top-K Multidimensional Gradients
Several business applications such as marketing basket analysis, clickstream analysis, fraud detection and churning migration analysis demand gradient data analysis. By employing g...
Ronnie Alves, Orlando Belo, Joel Ribeiro
CTRSA
2009
Springer
141views Cryptology» more  CTRSA 2009»
14 years 22 days ago
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are both short, and yet where many messages from different signers be verified very quickly. RSA signatures sati...
Anna Lisa Ferrara, Matthew Green, Susan Hohenberge...
WSC
2007
13 years 11 months ago
New greedy myopic and existing asymptotic sequential selection procedures: preliminary empirical results
Statistical selection procedures can identify the best of a finite set of alternatives, where “best” is defined in terms of the unknown expected value of each alternative’...
Stephen E. Chick, Jürgen Branke, Christian Sc...
CORR
2007
Springer
93views Education» more  CORR 2007»
13 years 8 months ago
Intrinsic dimension of a dataset: what properties does one expect?
— We propose an axiomatic approach to the concept of an intrinsic dimension of a dataset, based on a viewpoint of geometry of high-dimensional structures. Our first axiom postul...
Vladimir Pestov
CSREASAM
2008
13 years 10 months ago
Efficient Biometrics Remote User Authentication Scheme
Recently, bio-information has been playing an important role in modern user authentication schemes. In 2004, Lin and Lai proposed a flexible biometrics remote user authentication s...
Ming-Jheng Li, Justie Su-tzu Juan