Sciweavers

3059 search results - page 495 / 612
» Information modeling for single sourcing
Sort
View
ERCIMDL
2005
Springer
124views Education» more  ERCIMDL 2005»
14 years 2 months ago
A Comparison of On-Line Computer Science Citation Databases
This paper examines the difference and similarities between the two on-line computer science citation databases DBLP and CiteSeer. The database entries in DBLP are inserted manual...
Vaclav Petricek, Ingemar J. Cox, Hui Han, Isaac G....
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
14 years 2 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
ICDAR
2003
IEEE
14 years 2 months ago
On-line Overlaid-Handwriting Recognition Based on Substroke HMMs
This paper proposes a novel handwriting recognition interface for wearable computing where users write characters continuously without pauses on a small single writing box. Since ...
Hiroshi Shimodaira, Takashi Sudo, Mitsuru Nakai, S...
CCGRID
2002
IEEE
14 years 1 months ago
Tracing a Large-Scale Peer to Peer System: An Hour in the Life of Gnutella
Peer-to-peer computing and networking, an emerging model of communication and computation, has recently started to gain significant acceptance. This model not only enables client...
Evangelos P. Markatos
ISCA
1993
IEEE
113views Hardware» more  ISCA 1993»
14 years 1 months ago
A Comparison of Dynamic Branch Predictors that Use Two Levels of Branch History
Recent attention to speculative execution as a mechanism for increasing performance of single instruction streams has demanded substantially better branch prediction than what has...
Tse-Yu Yeh, Yale N. Patt