Sciweavers

2996 search results - page 455 / 600
» Information Modeling in the Time of the Revolution
Sort
View
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
14 years 3 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
CVPR
2003
IEEE
14 years 3 months ago
Dynamic Depth Recovery from Unsynchronized Video Streams
In this paper, we propose an algorithm for estimating dense depth information of dynamic scenes from multiple video streams captured using unsynchronized stationary cameras. We so...
Chunxiao Zhou, Hai Tao
IEEEAMS
2003
IEEE
14 years 3 months ago
Programming Systems for Autonomy
This paper describes a new approach to programming autonomic systems. Autonomic functions are integrated into element objects at design time using a special language called JSpoon...
Alexander V. Konstantinou, Yechiam Yemini
EPIA
2003
Springer
14 years 3 months ago
Evolutionary Neuroestimation of Fitness Functions
Abstract. One of the most influential factors in the quality of the solutions found by an evolutionary algorithm is the appropriateness of the fitness function. Specifically in ...
Jesús S. Aguilar-Ruiz, Daniel Mateos, Domin...
CCGRID
2002
IEEE
14 years 3 months ago
Tracing a Large-Scale Peer to Peer System: An Hour in the Life of Gnutella
Peer-to-peer computing and networking, an emerging model of communication and computation, has recently started to gain significant acceptance. This model not only enables client...
Evangelos P. Markatos