Sciweavers

3707 search results - page 719 / 742
» Clustering by Pattern Similarity
Sort
View
WISA
2009
Springer
14 years 3 months ago
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation
Power analysis has shown to be successful in breaking symmetric cryptographic algorithms implemented on low resource devices. Prompted by the breaking of many protected implementat...
J. Pan, J. I. den Hartog, Jiqiang Lu
ATAL
2009
Springer
14 years 3 months ago
Perspectives and challenges of agent-based simulation as a tool for economics and other social sciences
This paper argues that the agent-based simulation approach is just the one appropriate to the social sciences (including economics). Although there were many predecessor approache...
Klaus G. Troitzsch
CANDC
2009
ACM
14 years 3 months ago
Subliminal wiretapping
Subliminal Wiretapping is a subtly interactive artwork that utilizes random number generation modified through mindmatter effects to supply a continuous stream of words. Frequent,...
Shawn Lawson
FDG
2009
ACM
14 years 3 months ago
Exploring 3D gestural interfaces for music creation in video games
In recent years the popularity of music and rhythm-based games has experienced tremendous growth. However almost all of these games require custom hardware to be used as input dev...
Jared N. Bott, James G. Crowley, Joseph J. LaViola...
PETRA
2009
ACM
14 years 3 months ago
Towards faster activity search using embedding-based subsequence matching
Event search is the problem of identifying events or activity of interest in a large database storing long sequences of activity. In this paper, our topic is the problem of identi...
Panagiotis Papapetrou, Paul Doliotis, Vassilis Ath...