Sciweavers

356 search results - page 23 / 72
» A computational approach to negative priming
Sort
View
ICCSA
2007
Springer
14 years 1 months ago
Provably Secure Framework for Information Aggregation in Sensor Networks
Information aggregation is an important operation in wireless sensor networks executed for the purpose of monitoring and reporting of the environmental data. Due to the performance...
Mark Manulis, Jörg Schwenk
CHES
2003
Springer
149views Cryptology» more  CHES 2003»
14 years 19 days ago
Attacking Unbalanced RSA-CRT Using SPA
Abstract. Efficient implementations of RSA on computationally limited devices, such as smartcards, often use the CRT technique in combination with Garner’s algorithm in order to ...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
IRREGULAR
1995
Springer
13 years 11 months ago
Run-Time Parallelization of Irregular DOACROSS Loops
Dependencies between iterations of loop structures cannot always be determined at compile-time because they may depend on input data which is known only at run-time. A prime examp...
V. Prasad Krothapalli, Thulasiraman Jeyaraman, Mar...
ACL
2012
11 years 9 months ago
A Broad-Coverage Normalization System for Social Media Language
Social media language contains huge amount and wide variety of nonstandard tokens, created both intentionally and unintentionally by the users. It is of crucial importance to norm...
Fei Liu, Fuliang Weng, Xiao Jiang
ICCV
2009
IEEE
15 years 11 days ago
Is that you? Metric Learning Approaches for Face Identification
Face identification is the problem of determining whether two face images depict the same person or not. This is difficult due to variations in scale, pose, lighting, background...
Matthieu Guillaumin, Jakob Verbeek, Cordelia Schmi...