Sciweavers

1816 search results - page 256 / 364
» Formal Concepts of Learning Systems Validation in Use
Sort
View
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
13 years 7 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
HPDC
2008
IEEE
15 years 6 months ago
StoreGPU: exploiting graphics processing units to accelerate distributed storage systems
Today Graphics Processing Units (GPUs) are a largely underexploited resource on existing desktops and a possible costeffective enhancement to high-performance systems. To date, mo...
Samer Al-Kiswany, Abdullah Gharaibeh, Elizeu Santo...
SIGCSE
2006
ACM
163views Education» more  SIGCSE 2006»
15 years 5 months ago
TextMOLE: text mining operations library and environment
The paper describes the first version of the TextMOLE (Text Mining Operations Library and Environment) system for textual data mining. Currently TextMOLE acts as an advanced inde...
Daniel B. Waegel, April Kontostathis
IROS
2007
IEEE
164views Robotics» more  IROS 2007»
15 years 6 months ago
Emulation and behavior understanding through shared values
— Neurophysiology has revealed the existence of mirror neurons in brain of macaque monkeys and they shows similar activities during executing an observation of goal directed move...
Yasutake Takahashi, Teruyasu Kawamata, Minoru Asad...
ACMIDC
2010
15 years 3 months ago
BeeSim: leveraging wearable computers in participatory simulations with young children
New technologies have enabled students to become active participants in computational simulations of dynamic and complex systems (called Participatory Simulations), providing a &q...
Kylie A. Peppler, Joshua A. Danish, Benjamin Zaitl...