Sciweavers

305 search results - page 9 / 61
» From External to Internal Regret
Sort
View
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
13 years 12 months ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir
RTS
2006
99views more  RTS 2006»
13 years 7 months ago
Combination of clock-state and clock-rate correction in fault-tolerant distributed systems
This paper proposes the integration of internal and external clock synchronization by a combination of a fault-tolerant distributed algorithm for clock state correction with a cent...
Hermann Kopetz, Astrit Ademaj, Alexander Hanzlik
KDD
2008
ACM
128views Data Mining» more  KDD 2008»
14 years 8 months ago
Scaling up text classification for large file systems
: We combine the speed and scalability of information retrieval with the generally superior classification accuracy offered by machine learning, yielding a two-phase text classifie...
George Forman, Shyamsundar Rajaram
GI
2009
Springer
14 years 3 days ago
Activity Recognition using Optical Sensors on Mobile Phones
: Each mobile phone with a built-in CMOS sensor can inherently be seen as sophisticated optical sensor being able to analyze its environment in terms of visual events and its own m...
Michael Wittke, Uwe Jänen, Aret Duraslan, Emr...
ACTA
2000
302views more  ACTA 2000»
13 years 7 months ago
Efficiently building a parse tree from a regular expression
We show in this paper that parsing with regular expressions instead of context-free grammars, when it is possible, is desirable. We present efficient algorithms for performing diff...
Danny Dubé, Marc Feeley