Sciweavers

1929 search results - page 240 / 386
» Change Propagation Analysis Using Domain Information
Sort
View
164
Voted
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
15 years 10 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
ECAI
2004
Springer
15 years 10 months ago
Multiple Relaxations in Temporal Planning
CRIKEY is a planner that separates out the scheduling from the classical parts of temporal planning. This can be seen as a relaxation of the temporal information during the classic...
Keith Halsey, Derek Long, Maria Fox
146
Voted
VLC
2008
129views more  VLC 2008»
15 years 4 months ago
Proposing a speech to gesture translation architecture for Spanish deaf people
This article describes an architecture for translating speech into Spanish Sign Language (SSL). The architecture proposed is made up of four modules: speech recognizer, semantic a...
Rubén San Segundo, Juan Manuel Montero, Jav...
119
Voted
INFOVIS
2000
IEEE
15 years 9 months ago
Collaborative Geographic Visualization: Enabling Shared Understanding of Environmental Processes
Most work with geospatial data, whether for scientific analysis, urban and environmental planning, or business decision making is carried out by groups. In contrast, geographic vi...
Isaac Brewer, Alan M. MacEachren, Hadi Abdo, Jack ...
CHI
2010
ACM
15 years 1 months ago
Connect 2 congress: visual analytics for civic oversight
Strong representative democracies rely on educated, informed, and active citizenry to provide oversight of the government. We present Connect 2 Congress (C2C), a novel, high tempo...
Peter Kinnaird, Mario Romero, Gregory D. Abowd