Sciweavers

2028 search results - page 355 / 406
» Differential Power Analysis Model and Some Results
Sort
View
86
Voted
GECCO
2005
Springer
15 years 7 months ago
Theme preservation and the evolution of representation
The identification of mechanisms by which constraints on phenotypic variability are tuned in nature, and the implementation of these mechanisms in Evolutionary Algorithms (EAs) ca...
Keki M. Burjorjee, Jordan B. Pollack
100
Voted
CCS
2010
ACM
15 years 8 months ago
Toward practical authorization-dependent user obligation systems
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...
114
Voted
WIOPT
2005
IEEE
15 years 7 months ago
Performance Measurements of the Saturation Throughput in IEEE 802.11 Access Points
— Performance measurements of IEEE 802.11 access points provide important information for networking research and network management. In this paper, we present an active measurem...
Enrico Pelletta, Hector Velayos
SIGIR
2004
ACM
15 years 7 months ago
Display time as implicit feedback: understanding task effects
Recent research has had some success using the length of time a user displays a document in their web browser as implicit feedback for document preference. However, most studies h...
Diane Kelly, Nicholas J. Belkin
136
Voted
CEAS
2004
Springer
15 years 7 months ago
Extracting social networks and contact information from email and the Web
We present an end-to-end system that extracts a user’s social network and its members’ contact information given the user’s email inbox. The system identifies unique people...
Aron Culotta, Ron Bekkerman, Andrew McCallum