Sciweavers

26602 search results - page 5316 / 5321
» A New Imaging Model
Sort
View
ASIACRYPT
2011
Springer
14 years 11 days ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
111
Voted
CIKM
2011
Springer
14 years 10 days ago
A probabilistic method for inferring preferences from clicks
Evaluating rankers using implicit feedback, such as clicks on documents in a result list, is an increasingly popular alternative to traditional evaluation methods based on explici...
Katja Hofmann, Shimon Whiteson, Maarten de Rijke
133
Voted
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
14 years 5 days ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
DSD
2011
IEEE
200views Hardware» more  DSD 2011»
14 years 5 days ago
Microthreading as a Novel Method for Close Coupling of Custom Hardware Accelerators to SVP Processors
Abstract—We present a new low-level interfacing scheme for connecting custom accelerators to processors that tolerates latencies that usually occur when accessing hardware accele...
Jaroslav Sykora, Leos Kafka, Martin Danek, Lukas K...
135
Voted
HUC
2011
Springer
14 years 19 hour ago
Enabling large-scale human activity inference on smartphones using community similarity networks (csn)
Sensor-enabled smartphones are opening a new frontier in the development of mobile sensing applications. The recognition of human activities and context from sensor-data using cla...
Nicholas D. Lane, Ye Xu, Hong Lu, Shaohan Hu, Tanz...
« Prev « First page 5316 / 5321 Last » Next »