Sciweavers

10891 search results - page 1978 / 2179
» Combining Model Reductions
Sort
View
UIST
2010
ACM
14 years 10 months ago
Gesture search: a tool for fast mobile data access
Modern mobile phones can store a large amount of data, such as contacts, applications and music. However, it is difficult to access specific data items via existing mobile user in...
Yang Li
112
Voted
USS
2010
14 years 10 months ago
Acoustic Side-Channel Attacks on Printers
We examine the problem of acoustic emanations of printers. We present a novel attack that recovers what a dotmatrix printer processing English text is printing based on a record o...
Michael Backes, Markus Dürmuth, Sebastian Ger...
144
Voted
VLSID
2010
IEEE
155views VLSI» more  VLSID 2010»
14 years 10 months ago
Synchronized Generation of Directed Tests Using Satisfiability Solving
Directed test generation is important for the functional verification of complex system-on-chip designs. SAT based bounded model checking is promising for counterexample generatio...
Xiaoke Qin, Mingsong Chen, Prabhat Mishra
107
Voted
ACL
2009
14 years 10 months ago
Semi-supervised Learning for Automatic Prosodic Event Detection Using Co-training Algorithm
Most of previous approaches to automatic prosodic event detection are based on supervised learning, relying on the availability of a corpus that is annotated with the prosodic lab...
Je Hun Jeon, Yang Liu
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
14 years 10 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
« Prev « First page 1978 / 2179 Last » Next »