Sciweavers

14348 search results - page 2791 / 2870
» Active Database Systems
Sort
View
SCHOLARPEDIA
2010
80views more  SCHOLARPEDIA 2010»
13 years 9 months ago
Working memory
—Studies of attention and working memory address the fundamental limits in our ability to encode and maintain behaviorally relevant information, processes that are critical for g...
Alan Baddeley
SIAMSC
2010
215views more  SIAMSC 2010»
13 years 9 months ago
A Fast Algorithm for Sparse Reconstruction Based on Shrinkage, Subspace Optimization, and Continuation
We propose a fast algorithm for solving the ℓ1-regularized minimization problem minx∈Rn µ x 1 + Ax − b 2 2 for recovering sparse solutions to an undetermined system of linea...
Zaiwen Wen, Wotao Yin, Donald Goldfarb, Yin Zhang
TVCG
2010
165views more  TVCG 2010»
13 years 9 months ago
A Visual Backchannel for Large-Scale Events
—We introduce the concept of a Visual Backchannel as a novel way of following and exploring online conversations about large-scale events. Microblogging communities, such as Twit...
Marian Dörk, Daniel M. Gruen, Carey Williamso...
ACSAC
2010
IEEE
13 years 8 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 8 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
« Prev « First page 2791 / 2870 Last » Next »