Sciweavers

10891 search results - page 1978 / 2179
» Combining Model Reductions
Sort
View
UIST
2010
ACM
13 years 8 months ago
Gesture search: a tool for fast mobile data access
Modern mobile phones can store a large amount of data, such as contacts, applications and music. However, it is difficult to access specific data items via existing mobile user in...
Yang Li
USS
2010
13 years 8 months ago
Acoustic Side-Channel Attacks on Printers
We examine the problem of acoustic emanations of printers. We present a novel attack that recovers what a dotmatrix printer processing English text is printing based on a record o...
Michael Backes, Markus Dürmuth, Sebastian Ger...
VLSID
2010
IEEE
155views VLSI» more  VLSID 2010»
13 years 8 months ago
Synchronized Generation of Directed Tests Using Satisfiability Solving
Directed test generation is important for the functional verification of complex system-on-chip designs. SAT based bounded model checking is promising for counterexample generatio...
Xiaoke Qin, Mingsong Chen, Prabhat Mishra
ACL
2009
13 years 8 months ago
Semi-supervised Learning for Automatic Prosodic Event Detection Using Co-training Algorithm
Most of previous approaches to automatic prosodic event detection are based on supervised learning, relying on the availability of a corpus that is annotated with the prosodic lab...
Je Hun Jeon, Yang Liu
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
13 years 8 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
« Prev « First page 1978 / 2179 Last » Next »