Sciweavers

1995 search results - page 288 / 399
» Adaptive Information Filtering using Evolutionary Computatio...
Sort
View
FOCS
2008
IEEE
14 years 2 months ago
Leakage-Resilient Cryptography
We construct a stream-cipher SC whose implementation is secure even if a bounded amount of arbitrary (adaptively, adversarially chosen) information about the internal state of SC ...
Stefan Dziembowski, Krzysztof Pietrzak
AVI
2006
13 years 9 months ago
Input interactions and context component based modelisations: differences and similarities
Since several years, ubiquitous computing and pervasive computing has emerged and, in particular, context-aware computing. Using mobile devices, the context is perpetually evolvin...
Diane Lingrand, Michel Riveill
CHI
2006
ACM
14 years 8 months ago
Gaze-based interaction for semi-automatic photo cropping
We present an interactive method for cropping photographs given minimal information about the location of important content, provided by eye tracking. Cropping is formulated in a ...
Anthony Santella, Maneesh Agrawala, Douglas DeCarl...
BMCBI
2010
156views more  BMCBI 2010»
13 years 8 months ago
Comparative classification of species and the study of pathway evolution based on the alignment of metabolic pathways
Background: Pathways provide topical descriptions of cellular circuitry. Comparing analogous pathways reveals intricate insights into individual functional differences among speci...
Adi Mano, Tamir Tuller, Oded Béjà, R...
GLOBECOM
2006
IEEE
14 years 1 months ago
Comparative Evaluation of Prediction Heuristics for Wireless Channels
— Impairments in wireless data communication due to time and location dependent errors can be overcome by using channel-adaptive techniques, like channel-aware scheduling or adap...
Ana Aguiar, Adam Wolisz