Sciweavers

5275 search results - page 265 / 1055
» Computing by observing
Sort
View
DAC
2007
ACM
15 years 8 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
HRI
2007
ACM
15 years 8 months ago
Interactive robot task training through dialog and demonstration
Effective human/robot interfaces which mimic how humans interact with one another could ultimately lead to robots being accepted in a wider domain of applications. We present a fr...
Paul E. Rybski, Kevin Yoon, Jeremy Stolarz, Manuel...
DMSN
2006
ACM
15 years 8 months ago
Processing proximity queries in sensor networks
Sensor networks are often used to perform monitoring tasks, such as in animal or vehicle tracking and in surveillance of enemy forces in military applications. In this paper we in...
Yannis Kotidis
SPIN
2000
Springer
15 years 8 months ago
A Language Framework for Expressing Checkable Properties of Dynamic Software
Research on how to reason about correctness properties of software systems using model checking is advancing rapidly. Work on exnite-state models from program source code and on ab...
James C. Corbett, Matthew B. Dwyer, John Hatcliff,...
ACCV
2010
Springer
15 years 6 months ago
Identifying Surprising Events in Videos Using Bayesian Topic Models
Automatic processing of video data is essential in order to allow efficient access to large amounts of video content, a crucial point in such applications as video mining and surve...
Avishai Hendel, Daphna Weinshall, Shmuel Peleg