Sciweavers

8177 search results - page 1515 / 1636
» Detecting System Emulators
Sort
View
122
Voted
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
13 years 11 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
HPCA
2012
IEEE
13 years 11 months ago
Decoupled dynamic cache segmentation
The least recently used (LRU) replacement policy performs poorly in the last-level cache (LLC) because temporal locality of memory accesses is filtered by first and second level...
Samira Manabi Khan, Zhe Wang, Daniel A. Jimé...
189
Voted
MMM
2012
Springer
324views Multimedia» more  MMM 2012»
13 years 11 months ago
Sensor-Based Analysis of User Generated Video for Multi-camera Video Remixing
In this work we propose to exploit context sensor data for analyzing user generated videos. Firstly, we perform a low-level indexing of the recorded media with the instantaneous co...
Francesco Cricri, Igor D. D. Curcio, Sujeet Mate, ...
142
Voted
ICDCSW
2005
IEEE
15 years 9 months ago
Framework and Rule-Based Language for Facilitating Context-Aware Computing Using Information Appliances
Recently, context-aware computing with information appliances is the topic of many research efforts. In order to realize context-aware systems, it is necessary to describe rules, ...
Kouji Nishigaki, Keiichi Yasumoto, Naoki Shibata, ...
162
Voted
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
13 years 5 months ago
Mining event periodicity from incomplete observations
Advanced technology in GPS and sensors enables us to track physical events, such as human movements and facility usage. Periodicity analysis from the recorded data is an important...
Zhenhui Li, Jingjing Wang, Jiawei Han
« Prev « First page 1515 / 1636 Last » Next »