Sciweavers

5619 search results - page 1068 / 1124
» A Region Inference Algorithm
Sort
View
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 4 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
AIHC
2007
Springer
15 years 4 months ago
Modeling Naturalistic Affective States Via Facial, Vocal, and Bodily Expressions Recognition
Affective and human-centered computing have attracted a lot of attention during the past years, mainly due to the abundance of devices and environments able to exploit multimodal i...
Kostas Karpouzis, George Caridakis, Loïc Kess...
SSS
2007
Springer
121views Control Systems» more  SSS 2007»
15 years 3 months ago
Byzantine Self-stabilizing Pulse in a Bounded-Delay Model
Abstract. “Pulse Synchronization” intends to invoke a recurring distributed event at the different nodes, of a distributed system as simultaneously as possible and with a freq...
Danny Dolev, Ezra N. Hoch
ICDCS
2006
IEEE
15 years 3 months ago
Interplay of ISPs: Distributed Resource Allocation and Revenue Maximization
The Internet is a hierarchical architecture comprising heterogeneous entities of privately owned infrastructures, where higher level Internet service providers (ISPs) supply conne...
Sam C. M. Lee, Joe W. J. Jiang, John C. S. Lui, Da...
ICDM
2006
IEEE
91views Data Mining» more  ICDM 2006»
15 years 3 months ago
Entropy-based Concept Shift Detection
When monitoring sensory data (e.g., from a wearable device) the context oftentimes changes abruptly: people move from one situation (e.g., working quietly in their office) to ano...
Peter Vorburger, Abraham Bernstein
« Prev « First page 1068 / 1124 Last » Next »