Sciweavers

1617 search results - page 289 / 324
» Buzz-based recommender system
Sort
View
CCS
2010
ACM
13 years 9 months ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps
ATAL
2008
Springer
13 years 10 months ago
An embodied conversational agent as a lifestyle advisor
Persistent Embodied Conversational Agents (ECA) can be used to assist users in their daily activities. We introduce the Health and Fitness Companion (HFC), which is a conversation...
Cameron Smith, Daniel Charlton, Li Zhang, Marc Cav...
BMCBI
2010
50views more  BMCBI 2010»
13 years 9 months ago
Scanner calibration revisited
Background: Calibration of a microarray scanner is critical for accurate interpretation of microarray results. Shi et al. (BMC Bioinformatics, 2005, 6, Art. No. S11 Suppl. 2.) rep...
Alexander E. Pozhitkov
LATINCRYPT
2010
13 years 7 months ago
Cryptanalysis of the Hidden Matrix Cryptosystem
Abstract. In this paper, we present an efficient cryptanalysis of the socalled HM cryptosystem which was published at Asiacrypt’1999, and one perturbed version of HM. Until now, ...
Jean-Charles Faugère, Antoine Joux, Ludovic...
TCOS
2010
13 years 3 months ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin