Sciweavers

2835 search results - page 486 / 567
» Common Semantics for Use Cases and Task Models
Sort
View
HICSS
2008
IEEE
86views Biometrics» more  HICSS 2008»
14 years 2 months ago
Overcoming Impediments to Cell Phone Forensics
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Wayne Jansen, Aurélien Delaitre, Ludovic Mo...
ICASSP
2008
IEEE
14 years 2 months ago
Fine: Information embedding for document classification
The problem of document classification considers categorizing or grouping of various document types. Each document can be represented as a bag of words, which has no straightforw...
Kevin M. Carter, Raviv Raich, Alfred O. Hero
ATAL
2005
Springer
14 years 1 months ago
A real-world approach to secure and trusted negotiation in MASs
The problem of providing tools to support legally valid negotiations between agents is becoming more and more critical. Agents are supposed to perform crucial tasks autonomously; ...
Roberto Bianchi, Andrea Fontana, Federico Bergenti
COOPIS
2002
IEEE
14 years 21 days ago
A Decentralized Algorithm for Coordinating Independent Peers: An Initial Examination
Abstract. Peer-to-peer (P2P) applications are composed of a distributed collection of peers that cooperate in order to perform some common task. Though P2P applications have attrac...
Girish Suryanarayana, Richard N. Taylor
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
13 years 11 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov