Sciweavers

10996 search results - page 2116 / 2200
» Future Directions in Computing
Sort
View
ASIACRYPT
2009
Springer
14 years 3 months ago
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
Abstract. Physical attacks on cryptographic implementations and devices have become crucial. In this context a recent line of research on a new class of side-channel attacks, calle...
Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi,...
WABI
2009
Springer
124views Bioinformatics» more  WABI 2009»
14 years 3 months ago
Mimosa: Mixture Model of Co-expression to Detect Modulators of Regulatory Interaction
Background: Functionally related genes tend to be correlated in their expression patterns across multiple conditions and/or tissue-types. Thus co-expression networks are often use...
Matthew Hansen, Logan Everett, Larry Singh, Sridha...
WOLLIC
2009
Springer
14 years 3 months ago
Ludics and Its Applications to Natural Language Semantics
Abstract. Proofs in Ludics, have an interpretation provided by their counter-proofs, that is the objects they interact with. We shall follow the same idea by proposing that sentenc...
Alain Lecomte, Myriam Quatrini
ATAL
2009
Springer
14 years 3 months ago
Real-time expressive gaze animation for virtual humans
Gaze is an extremely important aspect of human face to face interaction. Over the course of an interaction, a single individual’s gaze can perform many different functions, such...
Marcus Thiébaux, Brent Lance, Stacy Marsell...
BTW
2009
Springer
145views Database» more  BTW 2009»
14 years 3 months ago
Retrieving Metadata for Your Local Scholarly Papers
: We present a novel approach to retrieve metadata to scholarly papers stored locally as PDF files. A fingerprint is produced from the PDF fulltext to query an online metadata repo...
David Aumüller
« Prev « First page 2116 / 2200 Last » Next »