Sciweavers

3276 search results - page 522 / 656
» Data Management for Pervasive Computing
Sort
View
EIT
2008
IEEE
15 years 22 days ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
IADIS
2003
15 years 10 days ago
Automatic Gui Generation in Web Based Information Systems
The HCI subsystem is an essential component of an Information System, whose success inside an organization strongly depend on user acceptance. A good UI design considering usabili...
Nicola Aloia, Cesare Concordia, Maria Teresa Parat...
BMCBI
2010
164views more  BMCBI 2010»
14 years 11 months ago
Gene regulatory networks modelling using a dynamic evolutionary hybrid
Background: Inference of gene regulatory networks is a key goal in the quest for understanding fundamental cellular processes and revealing underlying relations among genes. With ...
Ioannis A. Maraziotis, Andrei Dragomir, Dimitris T...
URBAN
2008
128views more  URBAN 2008»
14 years 11 months ago
Discerning landslide susceptibility using rough sets
Rough set theory has been primarily known as a mathematical approach for analysis of a vague description of objects. This paper explores the use of rough set theory to manage the ...
Pece V. Gorsevski, Piotr Jankowski
CIKM
2010
Springer
14 years 9 months ago
Understanding retweeting behaviors in social networks
Retweeting is an important action (behavior) on Twitter, indicating the behavior that users re-post microblogs of their friends. While much work has been conducted for mining text...
Zi Yang, Jingyi Guo, Keke Cai, Jie Tang, Juanzi Li...