Sciweavers

5615 search results - page 1002 / 1123
» Active Learner Modelling
Sort
View
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
15 years 4 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
162
Voted
ECRTS
2010
IEEE
15 years 4 months ago
Minimizing Multi-resource Energy for Real-Time Systems with Discrete Operation Modes
Energy conservation is an important issue in the design of embedded systems. Dynamic Voltage Scaling (DVS) and Dynamic Power Management (DPM) are two widely used techniques for sav...
Fanxin Kong, Yiqun Wang, Qingxu Deng, Wang Yi
125
Voted
AAAI
2010
15 years 3 months ago
The Boosting Effect of Exploratory Behaviors
Active object exploration is one of the hallmarks of human and animal intelligence. Research in psychology has shown that the use of multiple exploratory behaviors is crucial for ...
Jivko Sinapov, Alexander Stoytchev
146
Voted
MM
2010
ACM
252views Multimedia» more  MM 2010»
15 years 3 months ago
Real-time detection of unusual regions in image streams
Automatic and real-time identification of unusual incidents is important for event detection and alarm systems. In today's camera surveillance solutions video streams are dis...
Rene Schuster, Roland Mörzinger, Werner Haas,...
128
Voted
ECRTS
2010
IEEE
15 years 3 months ago
On Schedulability Analysis of Non-cyclic Generalized Multiframe Tasks
— The generalized multiframe (GMF) task has been proposed to model a task whose execution times, deadlines and minimum separation times are changed according to a specified patte...
Noel Tchidjo Moyo, Eric Nicollet, Frederic Lafaye,...
« Prev « First page 1002 / 1123 Last » Next »