Sciweavers

3092 search results - page 17 / 619
» Where are you pointing
Sort
View
WISA
2009
Springer
14 years 2 months ago
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation
Power analysis has shown to be successful in breaking symmetric cryptographic algorithms implemented on low resource devices. Prompted by the breaking of many protected implementat...
J. Pan, J. I. den Hartog, Jiqiang Lu
FOMI
2009
13 years 5 months ago
Do you still want to vote for your favorite politician? Ask Ontobella!
Abstract. The paper presents the preliminary version of Ontobella - a domain ontology of beliefs. The philosophical assumptions of this system are taken from the philosophy of Roma...
Pawel Garbacz, Marek Lechniak, Piotr Kulicki, Robe...
SIGIR
2011
ACM
12 years 10 months ago
Find it if you can: a game for modeling different types of web search success using interaction data
A better understanding of strategies and behavior of successful searchers is crucial for improving the experience of all searchers. However, research of search behavior has been s...
Mikhail Ageev, Qi Guo, Dmitry Lagun, Eugene Agicht...
UML
2001
Springer
13 years 12 months ago
Agile Modeling: A Brief Overview
: Agile Modeling (AM) is a practice-based methodology for effective modeling of software-based systems. Where the Unified Modeling Language (UML) defines a subset of the modeling t...
Scott W. Ambler
GIS
2006
ACM
14 years 8 months ago
Object localization based on directional information case of 2D vector data
If you were told that some object A was perfectly (or somewhat, or not at all) in some direction (e.g., west, above-right) of some reference object B, where in space would you loo...
Stelian Coros, JingBo Ni, Pascal Matsakis