Sciweavers

1986 search results - page 329 / 398
» constraints 2006
Sort
View
CHES
2006
Springer
152views Cryptology» more  CHES 2006»
14 years 1 months ago
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style
In recent years, some countermeasures against Differential Power Analysis (DPA) at the logic level have been proposed. At CHES 2005 conference, Popp and Mangard proposed a new coun...
Daisuke Suzuki, Minoru Saeki
CHI
2006
ACM
14 years 1 months ago
Representation of interwoven surfaces in 2 1/2 D drawing
The state-of-the-art in computer drawing programs is based on a number of concepts that are over two decades old. One such concept is the use of layers for ordering the surfaces i...
Keith Wiley, Lance R. Williams
CICLING
2006
Springer
14 years 1 months ago
Balancing Transactions in Practical Dialogues
In this paper a theory of dialogue acts analysis in problem-solving tasks-oriented conversations is presented. The theory postulates that in practical dialogues every transaction h...
Luis Cortés, Hayde Castellanos, Sergio Rafa...
CIKM
2006
Springer
14 years 1 months ago
Constrained subspace skyline computation
In this paper we introduce the problem of Constrained Subspace Skyline Queries. This class of queries can be thought of as a generalization of subspace skyline queries using range...
Evangelos Dellis, Akrivi Vlachou, Ilya Vladimirski...
CIKM
2006
Springer
14 years 1 months ago
Efficient join processing over uncertain data
In an uncertain database, each data item is modeled as a range associated with a probability density function. Previous works for this kind of data have focussed on simple queries...
Reynold Cheng, Sarvjeet Singh, Sunil Prabhakar, Ra...