Sciweavers

3446 search results - page 569 / 690
» A Reasoning Algorithm for pD*
Sort
View
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
15 years 2 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
ICML
2010
IEEE
15 years 2 months ago
A Theoretical Analysis of Feature Pooling in Visual Recognition
Many modern visual recognition algorithms incorporate a step of spatial `pooling', where the outputs of several nearby feature detectors are combined into a local or global `...
Y-Lan Boureau, Jean Ponce, Yann LeCun
ISLPED
2010
ACM
165views Hardware» more  ISLPED 2010»
15 years 1 months ago
Power-efficient directional wireless communication on small form-factor mobile devices
Wireless access is known to be power-hungry for mobile devices. A key reason is that devices radiate power in all directions and much of this power will not reach the destination....
Ardalan Amiri Sani, Hasan Dumanli, Lin Zhong, Ashu...
SIGIR
2010
ACM
15 years 1 months ago
Learning to rank query reformulations
Query reformulation techniques based on query logs have recently proven to be effective for web queries. However, when initial queries have reasonably good quality, these techniqu...
Van Dang, Michael Bendersky, W. Bruce Croft
SIGMOD
2010
ACM
151views Database» more  SIGMOD 2010»
15 years 1 months ago
Exploring schema similarity at multiple resolutions
Large, dynamic, and ad-hoc organizations must frequently initiate data integration and sharing efforts with insufficient awareness of how organizational data sources are related. ...
Ken Smith, Craig Bonaceto, Chris Wolf, Beth Yost, ...