Sciweavers

355 search results - page 51 / 71
» Diagnosis with Behavioral Modes
Sort
View
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
15 years 1 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
CHI
2007
ACM
15 years 10 months ago
Affordances for manipulation of physical versus digital media on interactive surfaces
This work presents the results of a comparative study in which we investigate the ways manipulation of physical versus digital media are fundamentally different from one another. ...
Lucia Terrenghi, David S. Kirk, Abigail Sellen, Sh...
ISSTA
2009
ACM
15 years 4 months ago
Specifying the worst case: orthogonal modeling of hardware errors
During testing, the execution of valid cases is only one part of the task. Checking the behavior in boundary situations and in the presence of errors is an equally important subje...
Jewgenij Botaschanjan, Benjamin Hummel
AGENTS
2001
Springer
15 years 2 months ago
A social reinforcement learning agent
We report on the use of reinforcement learning with Cobot, a software agent residing in the wellknown online community LambdaMOO. Our initial work on Cobot (Isbell et al.2000) pro...
Charles Lee Isbell Jr., Christian R. Shelton, Mich...
IWANN
2001
Springer
15 years 2 months ago
Neurobiological Modeling of Bursting Response During Visual Attention
: Thalamic neurons have an exclusive property named bursting response. Bursting response seems to have a critical role in producing saliency map and encoding conspicuity of locatio...
Reza Rajimehr, Leila Montaser Kouhsari