Sciweavers

1143 search results - page 121 / 229
» Extraction in software watermarking
Sort
View
AIM
2011
13 years 21 days ago
Transfer Learning by Reusing Structured Knowledge
Transfer learning aims to solve new learning problems by extracting and making use of the common knowledge found in related domains. A key element of transfer learning is to ident...
Qiang Yang, Vincent Wenchen Zheng, Bin Li, Hankz H...
MICRO
2007
IEEE
133views Hardware» more  MICRO 2007»
14 years 3 months ago
Revisiting the Sequential Programming Model for Multi-Core
Single-threaded programming is already considered a complicated task. The move to multi-threaded programming only increases the complexity and cost involved in software developmen...
Matthew J. Bridges, Neil Vachharajani, Yun Zhang, ...
CHI
2003
ACM
14 years 9 months ago
Designing to support communication on the move
We investigated what mobile workers do when they are mobile to achieve their communication goals, using contextual interviews and ethnographically inspired observations in a varie...
Jacqueline Brodie
FSTTCS
2009
Springer
14 years 3 months ago
Randomness extractors -- applications and constructions
Randomness extractors are efficient algorithms which convert weak random sources into nearly perfect ones. While such purification of randomness was the original motivation for c...
Avi Wigderson
FDTC
2007
Springer
124views Cryptology» more  FDTC 2007»
14 years 3 months ago
Countermeasures against Branch Target Buffer Attacks
Branch Prediction Analysis has been recently proposed as an attack method to extract the key from software implementations of the RSA public key cryptographic algorithm. In this p...
Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi,...