Sciweavers

11739 search results - page 2242 / 2348
» Slideshow: functional presentations
Sort
View
ELPUB
2007
ACM
14 years 24 days ago
The Project of the Italian Culture Portal and its Development. A Case Study: Designing a Dublin Core Application Profile for Int
In September 2004 the Italian Ministry of Cultural Heritage and Activities (MiBAC) committed to Scuola Normale Superiore di Pisa (SNS) the scientific and technical project for the...
Irene Buonazia, Maria Emilia Masci, Davide Merlitt...
DAC
2010
ACM
14 years 23 days ago
LUT-based FPGA technology mapping for reliability
As device size shrinks to the nanometer range, FPGAs are increasingly prone to manufacturing defects. We anticipate that the ability to tolerate multiple defects will be very impo...
Jason Cong, Kirill Minkovich
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
14 years 23 days ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma
ESA
2007
Springer
153views Algorithms» more  ESA 2007»
14 years 23 days ago
Tradeoffs and Average-Case Equilibria in Selfish Routing
We consider the price of selfish routing in terms of tradeoffs and from an average-case perspective. Each player in a network game seeks to send a message with a certain length by...
Martin Hoefer, Alexander Souza
SP
2010
IEEE
226views Security Privacy» more  SP 2010»
14 years 22 days ago
Chip and PIN is Broken
—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Eur...
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, ...
« Prev « First page 2242 / 2348 Last » Next »