Sciweavers

963 search results - page 145 / 193
» Rethinking Algorithm Design and Development in Speech Proces...
Sort
View
KDD
2004
ACM
150views Data Mining» more  KDD 2004»
14 years 9 months ago
A framework for ontology-driven subspace clustering
Traditional clustering is a descriptive task that seeks to identify homogeneous groups of objects based on the values of their attributes. While domain knowledge is always the bes...
Jinze Liu, Wei Wang 0010, Jiong Yang
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 3 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
INFOCOM
2009
IEEE
14 years 3 months ago
Structured Admission Control Policy in Heterogeneous Wireless Networks with Mesh Underlay
—In this paper, we investigate into optimal admission control policies for Heterogeneous Wireless Networks (HWN), considering an integration of wireless mesh networks with an ove...
Amin Farbod, Ben Liang
VRST
2005
ACM
14 years 2 months ago
A practical system for laser pointer interaction on large displays
Much work has been done on the development of laser pointers as interaction devices. Typically a camera captures images of a display surface and extracts a laser pointer dot locat...
Benjamin A. Ahlborn, David Thompson, Oliver Kreylo...
DAC
1999
ACM
14 years 9 months ago
A Multiscale Method for Fast Capacitance Extraction
The many levels of metal used in aggressive deep submicron process technologies has made fast and accurate capacitance extraction of complicated 3-D geometries of conductors essen...
Johannes Tausch, Jacob K. White