Sciweavers

1369 search results - page 193 / 274
» A Practical Implementation of the Timing Attack
Sort
View
SIGMOD
2005
ACM
150views Database» more  SIGMOD 2005»
15 years 11 months ago
BRAID: Stream Mining through Group Lag Correlations
The goal is to monitor multiple numerical streams, and determine which pairs are correlated with lags, as well as the value of each such lag. Lag correlations (and anticorrelation...
Yasushi Sakurai, Spiros Papadimitriou, Christos Fa...
PERCOM
2003
ACM
15 years 10 months ago
Portability, Extensibility and Robustness in iROS
The dynamism and heterogeneity in ubicomp environments on both short and long time scales implies that middleware platforms for these environments need to be designed ground up fo...
Shankar Ponnekanti, Brad Johanson, Emre Kiciman, A...
ESORICS
2009
Springer
15 years 5 months ago
Towards a Privacy-Preserving National Identity Card
In this paper, we propose to replace the national identity card, currently used in many countries, by a personal device that allows its user to prove some binary statements about h...
Yves Deswarte, Sébastien Gambs
ICPR
2008
IEEE
15 years 5 months ago
A performance controllable octree construction method
The conventional octree construction method is implemented iteratively at consecutive subdivision levels. The resultant octree models at different subdivision levels contain quite...
Zen Chen, Hong-Long Chou, Wen-Chao Chen
INFOCOM
2008
IEEE
15 years 5 months ago
A Singlehop Collaborative Feedback Primitive for Wireless Sensor Networks
Abstract—To achieve scalability, energy-efficiency, and timeliness, wireless sensor network deployments increasingly employ in-network processing. In this paper, we identify sin...
Murat Demirbas, Onur Soysal, Muzammil Hussain