Sciweavers

5365 search results - page 909 / 1073
» Hierarchical Information Maps
Sort
View
TEI
2010
ACM
134views Hardware» more  TEI 2010»
14 years 5 months ago
Tangible lightscapes
Tangible Lightscapes is a research on interfaces mainly based on light and gestures. The aim of my exploration is to design a vocabulary of light behaviours to show people what th...
Alice V. Pintus
TEI
2010
ACM
172views Hardware» more  TEI 2010»
14 years 5 months ago
FlexiKnobs: bridging the gap between mouse interaction and hardware controllers
Parameters in audio or video editing applications can mostly be controlled by a variety of hardware devices such as MIDI controllers. These, however, usually feature only a limite...
Kristian Gohlke, Michael Hlatky, Sebastian Heise, ...
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
14 years 5 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
ARC
2009
Springer
140views Hardware» more  ARC 2009»
14 years 5 months ago
FPGA-Based Anomalous Trajectory Detection Using SOFM
A system for automatically classifying the trajectory of a moving object in a scene as usual or suspicious is presented. The system uses an unsupervised neural network (Self Organi...
Kofi Appiah, Andrew Hunter, Tino Kluge, Philip Aik...
CCS
2009
ACM
14 years 5 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...