Sciweavers

1995 search results - page 265 / 399
» Belief in Information Flow
Sort
View
82
Voted
SIGCSE
2009
ACM
94views Education» more  SIGCSE 2009»
16 years 1 months ago
CS1 students speak: advice for students by students
We collected advice on how to succeed at learning to program from 164 CS1 students at 3 institutions during a "saying is believing"intervention designed to encourage a g...
Beth Simon, Brian Hanks, Carol Zander, Laurie Murp...
ESORICS
2002
Springer
16 years 13 days ago
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense
It is believed that masking is an effective countermeasure against power analysis attacks: before a certain operation involving a key is performed in a cryptographic chip, the inpu...
Marcin Gomulkiewicz, Miroslaw Kutylowski
143
Voted
MOBISYS
2003
ACM
16 years 12 days ago
System Services for Ad-Hoc Routing: Architecture, Implementation and Experiences
This work explores several system issues regarding the design and implementation of routing protocols for ad-hoc wireless networks. We examine the routing architecture in current ...
Vikas Kawadia, Yongguang Zhang, Binita Gupta
90
Voted
ICCD
2002
IEEE
130views Hardware» more  ICCD 2002»
15 years 9 months ago
Branch Behavior of a Commercial OLTP Workload on Intel IA32 Processors
This paper presents a detailed branch characterization of an Oracle based commercial on-line transaction processing workload, Oracle Database Benchmark (ODB), running on an IA32 p...
Murali Annavaram, Trung A. Diep, John Paul Shen
91
Voted
CVPR
2010
IEEE
15 years 9 months ago
Efficient Extraction of Human Motion Volumes by Tracking
We present an automatic and efficient method to extract spatio-temporal human volumes from video, which combines top-down model-based and bottom-up appearancebased approaches. Fr...
Juan Carlos Niebles, Bohyung Han, Li Fei-Fei