Sciweavers

1964 search results - page 148 / 393
» informs 2011
Sort
View
CIKM
2011
Springer
14 years 4 months ago
S3K: seeking statement-supporting top-K witnesses
Traditional information retrieval techniques based on keyword search help to identify a ranked set of relevant documents, which often contains many documents in the top ranks that...
Steffen Metzger, Shady Elbassuoni, Katja Hose, Ral...
ICASSP
2011
IEEE
14 years 8 months ago
Nonlinear audio recurrence analysis with application to genre classification
In this paper we apply nonlinear signal analysis to a music information retrieval task. More concretely, we apply the concept of recurrence plots and recurrence histograms to extr...
Joan Serra, Carlos A. de los Santos, Ralph G. Andr...
IACR
2011
132views more  IACR 2011»
14 years 4 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
WWW
2011
ACM
14 years 11 months ago
Open and decentralized access across location-based services
Users now interact with multiple Location-Based Services (LBS) through a myriad set of location-aware devices and interfaces. However, current LBS tend to be centralized silos wit...
Yiming Liu, Rui Yang, Erik Wilde
TMC
2011
1105views more  TMC 2011»
14 years 11 months ago
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
—Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monit...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He