Sciweavers

31324 search results - page 124 / 6265
» Compare
Sort
View
AMTA
1998
Springer
15 years 8 months ago
A Comparative Study of Query and Document Translation for Cross-Language Information Retrieval
Cross-language retrieval systems use queries in one natural language to guide retrieval of documents that might be written in another. Acquisition and representation of translation...
Douglas W. Oard
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 8 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
CHI
2007
ACM
15 years 8 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
HRI
2007
ACM
15 years 8 months ago
Comparing a computer agent with a humanoid robot
HRI researchers interested in social robots have made large investments in humanoid robots. There is still sparse evidence that peoples' responses to robots differ from their...
Aaron Powers, Sara B. Kiesler, Susan R. Fussell, C...
APCHI
2004
IEEE
15 years 8 months ago
NetWorker: A Practical Web-Based Tool to Support the Collect-Compare-Choose Cycle
An earlier paper has covered the development of a paper prototype of NetWorker, a tool designed to facilitate a Web usage referred to as the Collect-Compare-Choose cycle. Here we d...
Paul J. Lyons, Chris Phillips, Elizabeth A. Kemp, ...