Sciweavers

4418 search results - page 879 / 884
» A Formal Approach to Computer Systems Requirements Documenta...
Sort
View
ACSAC
2008
IEEE
15 years 4 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...
SEMWEB
2007
Springer
15 years 3 months ago
OLA in the OAEI 2007 Evaluation Contest
Abstract. Similarity has become a classical tool for ontology confrontation motivated by alignment, mapping or merging purposes. In the definition of an ontologybased measure one ...
Jean François Djoufak Kengue, Jér&oc...
ICPADS
2006
IEEE
15 years 3 months ago
SPM Conscious Loop Scheduling for Embedded Chip Multiprocessors
One of the major factors that can potentially slow down widespread use of embedded chip multiprocessors is lack of efficient software support. In particular, automated code paral...
Liping Xue, Mahmut T. Kandemir, Guangyu Chen, Tayl...
ETRA
2006
ACM
114views Biometrics» more  ETRA 2006»
15 years 3 months ago
Visual attention in 3D video games
Understanding players’ visual attention patterns within an interactive 3D game environment is an important research area that can improve game level design and graphics. Several...
Su Yan, Magy Seif El-Nasr
HRI
2006
ACM
15 years 3 months ago
Daily HRI evaluation at a classroom environment: reports from dance interaction experiments
The design and development of social robots that interact and assist people in daily life requires moving into unconstrained daily-life environments. This presents unexplored meth...
Fumihide Tanaka, Javier R. Movellan, Bret Fortenbe...