Sciweavers

26354 search results - page 170 / 5271
» How we refactor, and how we know it
Sort
View
IACR
2011
132views more  IACR 2011»
12 years 10 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
ECAL
1999
Springer
14 years 2 months ago
How Symbiosis Can Guide Evolution
Hinton and Nowlan have demonstrated a model of how lifetime plasticity can guide evolution. They show how acquired traits change the shape of the reward landscape in which subseque...
Richard A. Watson, Jordan B. Pollack
ML
2007
ACM
122views Machine Learning» more  ML 2007»
13 years 10 months ago
Status report: hot pickles, and how to serve them
The need for flexible forms of serialisation arises under many circumstances, e.g. for doing high-level inter-process communication or to achieve persistence. Many languages, inc...
Andreas Rossberg, Guido Tack, Leif Kornstaedt
WWW
2008
ACM
14 years 11 months ago
How people use the web on mobile devices
This paper describes a series of user studies on how people use the Web via mobile devices. The data primarily comes from contextual inquiries with 47 participants between 2004 an...
Yanqing Cui, Virpi Roto
WWW
2010
ACM
14 years 5 months ago
How much is your personal recommendation worth?
Suppose you buy a new laptop and, simply because you like it so much, you recommend it to friends, encouraging them to purchase it as well. What would be an adequate price for the...
Paul Dütting, Monika Henzinger, Ingmar Weber