Sciweavers

6770 search results - page 116 / 1354
» How GPUs Work
Sort
View
DSN
2006
IEEE
14 years 4 months ago
Collecting and Analyzing Failure Data of Bluetooth Personal Area Networks
This work presents a failure data analysis campaign on Bluetooth Personal Area Networks (PANs) conducted on two kind of heterogeneous testbeds (working for more than one year). Th...
Marcello Cinque, Domenico Cotroneo, Stefano Russo
IV
2006
IEEE
98views Visualization» more  IV 2006»
14 years 4 months ago
Reviewing Data Visualization: an Analytical Taxonomical Study
This paper presents an analytical taxonomy that can suitably describe, rather than simply classify, techniques for data presentation. Unlike previous works, we do not consider par...
José Fernando Rodrigues Jr., Agma J. M. Tra...
CHES
2004
Springer
136views Cryptology» more  CHES 2004»
14 years 3 months ago
Attacking DSA Under a Repeated Bits Assumption
We discuss how to recover the private key for DSA style signature schemes if partial information about the ephemeral keys is revealed. The partial information we examine is of a se...
Peter J. Leadbitter, Dan Page, Nigel P. Smart
NIME
2004
Springer
105views Music» more  NIME 2004»
14 years 3 months ago
The Slidepipe: A Timeline-Based Controller for Real-Time Sample Manipulation
When working with sample-based media, a performer is managing timelines, loop points, sample parameters and effects parameters. The Slidepipe is a performance controller that give...
Mark Argo
HICSS
2000
IEEE
154views Biometrics» more  HICSS 2000»
14 years 2 months ago
Anti-Serendipity: Finding Useless Documents and Similar Documents
The problem of finding your way through a relatively unknown collection of digital documents can be daunting. Such collections sometimes have few categories and little hierarchy, ...
James W. Cooper, John M. Prager