Sciweavers

536 search results - page 58 / 108
» Evaluating Metrical Phonology - a Computational- Empirical A...
Sort
View
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 8 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
SIGIR
2010
ACM
15 years 1 months ago
Generalized syntactic and semantic models of query reformulation
We present a novel approach to query reformulation which combines syntactic and semantic information by means of generalized Levenshtein distance algorithms where the substitution...
Amac Herdagdelen, Massimiliano Ciaramita, Daniel M...
ICPP
2005
IEEE
15 years 7 months ago
Two-Tier Resource Allocation for Slowdown Differentiation on Server Clusters
Slowdown, defined as the ratio of a request’s queueing delay to its service time, is accepted as an important quality of service metric of Internet servers. In this paper, we i...
Xiaobo Zhou, Yu Cai, C. Edward Chow, Marijke F. Au...
AAAI
2012
13 years 3 months ago
Strategic Advice Provision in Repeated Human-Agent Interactions
This paper addresses the problem of automated advice provision in settings that involve repeated interactions between people and computer agents. This problem arises in many real ...
Amos Azaria, Zinovi Rabinovich, Sarit Kraus, Claud...
CVPR
2010
IEEE
15 years 9 months ago
Efficient Action Spotting based on a Spacetime Oriented Structure Representation
This paper addresses action spotting, the spatiotemporal detection and localization of human actions in video. A novel compact local descriptor of video dynamics in the context of...
Konstantinos Derpanis, Mikhail Sizintsev, Kevin Ca...