Sciweavers

826 search results - page 158 / 166
» What Triggers a Behavior
Sort
View
COMPSAC
2004
IEEE
14 years 1 months ago
Towards Autonomic Computing Middleware via Reflection
ion Abstracts Zizhan Zheng, Qianxiang Wang, Gang Huang and Hong Mei. Design and Implementation of the Load Balancing Mechanism in PKUAS (in Chinese). ACTA ELECTRONICA SINICA, 32(12...
Gang Huang, Tiancheng Liu, Hong Mei, Zizhan Zheng,...
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
14 years 1 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
DRM
2006
Springer
14 years 1 months ago
Vicarious infringement creates a privacy ceiling
In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTunes, there is considerable potential for collecting personal ...
Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver
FAST
2010
14 years 4 days ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
ATAL
2008
Springer
13 years 11 months ago
Modeling parallel and reactive empathy in virtual agents: an inductive approach
Humans continuously assess one another's situational context, modify their own affective state, and then respond based on these outcomes through empathetic expression. Virtua...
Scott W. McQuiggan, Jennifer L. Robison, Robert Ph...