Sciweavers

1369 search results - page 231 / 274
» A Practical Implementation of the Timing Attack
Sort
View
ICASSP
2011
IEEE
14 years 2 months ago
Third order widely non linear Volterra MVDR beamforming
It is now well known that time invariant (TI) linear beamformers, such as the Capon’s beamformer, are only optimal for stationary Gaussian observations whose complex envelope is...
Pascal Chevalier, Abdelkader Oukaci, Jean Pierre D...
99
Voted
ICDCSW
2005
IEEE
15 years 4 months ago
Framework and Rule-Based Language for Facilitating Context-Aware Computing Using Information Appliances
Recently, context-aware computing with information appliances is the topic of many research efforts. In order to realize context-aware systems, it is necessary to describe rules, ...
Kouji Nishigaki, Keiichi Yasumoto, Naoki Shibata, ...
DAC
2006
ACM
15 years 12 months ago
Efficient simulation of critical synchronous dataflow graphs
Simulation and verification using electronic design automation (EDA) tools are key steps in the design process for communication and signal processing systems. The synchronous dat...
Chia-Jui Hsu, José Luis Pino, Ming-Yung Ko,...
156
Voted
SIGMOD
2006
ACM
149views Database» more  SIGMOD 2006»
15 years 11 months ago
Efficient query processing on unstructured tetrahedral meshes
Modern scientific applications consume massive volumes of data produced by computer simulations. Such applications require new data management capabilities in order to scale to te...
Stratos Papadomanolakis, Anastassia Ailamaki, Juli...
82
Voted
ACMDIS
2004
ACM
15 years 4 months ago
The calder toolkit: wired and wireless components for rapidly prototyping interactive devices
Toolkits and other tools have dramatically reduced the time and technical expertise needed to design and implement graphical user interfaces (GUIs) allowing high-quality, iterativ...
Johnny C. Lee, Daniel Avrahami, Scott E. Hudson, J...