Sciweavers

2479 search results - page 190 / 496
» A Computational Theory of Working Memory
Sort
View
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
13 years 10 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
IJSE
2010
138views more  IJSE 2010»
13 years 6 months ago
Modeling the Experience of Emotion
Affective computing has proven to be a viable field of research comprised of a large number of multidisciplinary researchers resulting in work that is widely published. The majori...
Joost Broekens
CVPR
2008
IEEE
14 years 11 months ago
Smoothing-based Optimization
We propose an efficient method for complex optimization problems that often arise in computer vision. While our method is general and could be applied to various tasks, it was mai...
Marius Leordeanu, Martial Hebert
CHI
2007
ACM
14 years 9 months ago
A minimal model for predicting visual search in human-computer interaction
Visual search is an important part of human-computer interaction. It is critical that we build theory about how people visually search displays in order to better support the user...
Tim Halverson, Anthony J. Hornof
ATAL
2009
Springer
14 years 3 months ago
State-coupled replicator dynamics
This paper introduces a new model, i.e. state-coupled replicator dynamics, expanding the link between evolutionary game theory and multiagent reinforcement learning to multistate ...
Daniel Hennes, Karl Tuyls, Matthias Rauterberg