Sciweavers

1265 search results - page 117 / 253
» Finding the Key to a Synapse
Sort
View
WWW
2003
ACM
14 years 10 months ago
Comparing link marker visualization techniques: changes in reading behavior
Links are one of the most important means for navigation in the World Wide Web. However, the visualization of and the interaction with Web links have been scarcely explored, altho...
Hartmut Obendorf, Harald Weinreich
CP
2009
Springer
14 years 9 months ago
Constraint-Based Optimal Testing Using DNNF Graphs
The goal of testing is to distinguish between a number of hypotheses about a systemfor example, dierent diagnoses of faults by applying input patterns and verifying or falsifying t...
Anika Schumann, Martin Sachenbacher, Jinbo Huang
PPOPP
2009
ACM
14 years 9 months ago
Comparability graph coloring for optimizing utilization of stream register files in stream processors
A stream processor executes an application that has been decomposed into a sequence of kernels that operate on streams of data elements. During the execution of a kernel, all stre...
Xuejun Yang, Li Wang, Jingling Xue, Yu Deng, Ying ...
CHES
2009
Springer
157views Cryptology» more  CHES 2009»
14 years 9 months ago
Differential Cluster Analysis
Abstract. We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions ...
Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Ru...
CHI
2008
ACM
14 years 9 months ago
Activity sensing in the wild: a field trial of ubifit garden
Recent advances in small inexpensive sensors, low-power processing, and activity modeling have enabled applications that use on-body sensing and machine learning to infer people&#...
Sunny Consolvo, David W. McDonald, Tammy Toscos, M...