Sciweavers

1675 search results - page 81 / 335
» The Value of a Good Name
Sort
View
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
14 years 27 days ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
USENIX
2007
13 years 11 months ago
Supporting Practical Content-Addressable Caching with CZIP Compression
Content-based naming (CBN) enables content sharing across similar files by breaking files into positionindependent chunks and naming these chunks using hashes of their contents....
KyoungSoo Park, Sunghwan Ihm, Mic Bowman, Vivek S....
LREC
2008
125views Education» more  LREC 2008»
13 years 10 months ago
Evaluation of Natural Language Tools for Italian: EVALITA 2007
EVALITA 2007, the first edition of the initiative devoted to the evaluation of Natural Language Processing tools for Italian, provided a shared framework where participants' ...
Bernardo Magnini, Amedeo Cappelli, Fabio Tamburini...
AIPS
2000
13 years 10 months ago
Representations of Decision-Theoretic Planning Tasks
Goal-directed Markov Decision Process models (GDMDPs) are good models for many decision-theoretic planning tasks. They have been used in conjunction with two different reward stru...
Sven Koenig, Yaxin Liu
CN
2006
91views more  CN 2006»
13 years 9 months ago
Reputation-based policies that provide the right incentives in peer-to-peer environments
Peer-to-peer are popular environments for exchanging services. A reputation mechanism is a proper means of discovering low-performing peers that fail to provide their services. In...
Thanasis G. Papaioannou, George D. Stamoulis