Sciweavers

1428 search results - page 261 / 286
» aim 2010
Sort
View
CHES
2010
Springer
187views Cryptology» more  CHES 2010»
13 years 8 months ago
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain...
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...
CLEF
2010
Springer
13 years 8 months ago
Bootstrapping Websites for Classification of Organization Names on Twitter
There has been a growing interest in monitoring the social media presence of companies for improved marketing. Many public APIs are available for tapping into the data, and there a...
Paul Kalmar
DMSN
2010
ACM
13 years 8 months ago
DEMS: a data mining based technique to handle missing data in mobile sensor network applications
In Mobile Sensor Network (MSN) applications, sensors move to increase the area of coverage and/or to compensate for the failure of other sensors. In such applications, loss or cor...
Le Gruenwald, Md. Shiblee Sadik, Rahul Shukla, Han...
HUC
2010
Springer
13 years 8 months ago
Remarkable objects: supporting collaboration in a creative environment
(a) (b) Figure 1: (a) CAM running on an iPhone; (b) Reading a design sketch using Microsoft's TagReader client. In this paper, we report the results of a field trial of a Ubi...
Dhaval Vyas, Anton Nijholt, Dirk Heylen, Alexander...
HUC
2010
Springer
13 years 8 months ago
EmotionSense: a mobile phones based adaptive platform for experimental social psychology research
Today's mobile phones represent a rich and powerful computing platform, given their sensing, processing and communication capabilities. Phones are also part of the everyday l...
Kiran K. Rachuri, Mirco Musolesi, Cecilia Mascolo,...