Sciweavers

3155 search results - page 103 / 631
» How Are You Doing
Sort
View
IACR
2011
132views more  IACR 2011»
12 years 7 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
HICSS
2006
IEEE
96views Biometrics» more  HICSS 2006»
14 years 1 months ago
When Online Reviews Meet Hyperdifferentiation: A Study of Craft Beer Industry
We analyze how online reviews can be used to evaluate product differentiation strategy based on the theories of hyperdifferentiation and resonance marketing. Hyperdifferentiation ...
Eric K. Clemons, Guodong Gao, Lorin M. Hitt
PAKDD
2010
ACM
117views Data Mining» more  PAKDD 2010»
14 years 17 days ago
BASSET: Scalable Gateway Finder in Large Graphs
Given a social network, who is the best person to introduce you to, say, Chris Ferguson, the poker champion? Or, given a network of people and skills, who is the best person to he...
Hanghang Tong, Spiros Papadimitriou, Christos Falo...
WSC
1997
13 years 9 months ago
Creating a Flexible, Simulation-Based Finite Scheduling Tool
Today's business climate for manufacturers requires low inventory, quick response systems that turn out a wide variety of products. Since many companies are reaching physical...
Barbara W. Mazziotti, Richard E. Horne Jr.
AAAI
1996
13 years 9 months ago
Interactive Information Retrieval Systems with Minimalist Representation
Almost any information you might want is becoming available on-line. The problem is how to find what you need. One strategy to improve access to existing information sources, is i...
Eric A. Domeshek, Smadar Kedar, Andrew S. Gordon