Sciweavers

1369 search results - page 210 / 274
» A Practical Implementation of the Timing Attack
Sort
View
CHI
2001
ACM
15 years 11 months ago
Beyond command knowledge: identifying and teaching strategic knowledge for using complex computer applications
Despite experience, many users do not make efficient use of complex computer applications. We argue that this is caused by a lack of strategic knowledge that is difficult to acqui...
Suresh K. Bhavnani, Frederick Reif, Bonnie E. John
SODA
2010
ACM
426views Algorithms» more  SODA 2010»
15 years 8 months ago
Shape Replication Through Self-Assembly and RNase Enzymes
We introduce the problem of shape replication in the Wang tile self-assembly model. Given an input shape, we consider the problem of designing a self-assembly system which will re...
Zachary Abel, Nadia Benbernou, Mirela Damian, Erik...
PEPM
2010
ACM
15 years 8 months ago
Clone detection and elimination for Haskell
Duplicated code is a well known problem in software maintenance and refactoring. Code clones tend to increase program size and several studies have shown that duplicated code make...
Christopher Brown, Simon Thompson
CVPR
2009
IEEE
15 years 5 months ago
A 3D reconstruction pipeline for digital preservation
—We present a new 3D reconstruction pipeline for digital preservation of natural and cultural assets. This application requires high quality results, making time and space constr...
Alexandre Vrubel, Olga Regina Pereira Bellon, Luci...
ICDE
2009
IEEE
159views Database» more  ICDE 2009»
15 years 5 months ago
Efficient Private Record Linkage
— Record linkage is the computation of the associations among records of multiple databases. It arises in contexts like the integration of such databases, online interactions and...
Mohamed Yakout, Mikhail J. Atallah, Ahmed K. Elmag...