Sciweavers

3770 search results - page 662 / 754
» Building a Stochastic Dynamic Model of Application Use
Sort
View
CHI
2010
ACM
14 years 4 months ago
Curator: a game with a purpose for collection recommendation
Collection recommender systems suggest groups of items that work well as a whole. The interaction effects between items is an important consideration, but the vast space of possib...
Greg Walsh, Jennifer Golbeck
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
14 years 3 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
IWSEC
2007
Springer
14 years 3 months ago
Batch Pairing Delegation
Abstract. Pairing-based cryptography (PBC) has enabled the construction of many cryptographic protocols. However, there are scenarios when PBC is too heavyweight to use, such as wh...
Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smit...
ICRA
2006
IEEE
148views Robotics» more  ICRA 2006»
14 years 3 months ago
Surface Patch Reconstruction via Curve Sampling
This paper introduces a method that reconstructs a surface patch by sampling along three concurrent curves on the surface with a touch sensor. These data curves, each lying in a d...
Yan-Bin Jia, Liangchuan Mi, Jiang Tian
DSD
2003
IEEE
138views Hardware» more  DSD 2003»
14 years 2 months ago
A Two-step Genetic Algorithm for Mapping Task Graphs to a Network on Chip Architecture
Network on Chip (NoC) is a new paradigm for designing core based System on Chip which supports high degree of reusability and is scalable. In this paper we describe an efficient t...
Tang Lei, Shashi Kumar