Sciweavers

10996 search results - page 2116 / 2200
» Future Directions in Computing
Sort
View
ASIACRYPT
2009
Springer
15 years 11 months ago
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
Abstract. Physical attacks on cryptographic implementations and devices have become crucial. In this context a recent line of research on a new class of side-channel attacks, calle...
Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi,...
WABI
2009
Springer
124views Bioinformatics» more  WABI 2009»
15 years 11 months ago
Mimosa: Mixture Model of Co-expression to Detect Modulators of Regulatory Interaction
Background: Functionally related genes tend to be correlated in their expression patterns across multiple conditions and/or tissue-types. Thus co-expression networks are often use...
Matthew Hansen, Logan Everett, Larry Singh, Sridha...
WOLLIC
2009
Springer
15 years 11 months ago
Ludics and Its Applications to Natural Language Semantics
Abstract. Proofs in Ludics, have an interpretation provided by their counter-proofs, that is the objects they interact with. We shall follow the same idea by proposing that sentenc...
Alain Lecomte, Myriam Quatrini
ATAL
2009
Springer
15 years 11 months ago
Real-time expressive gaze animation for virtual humans
Gaze is an extremely important aspect of human face to face interaction. Over the course of an interaction, a single individual’s gaze can perform many different functions, such...
Marcus Thiébaux, Brent Lance, Stacy Marsell...
151
Voted
BTW
2009
Springer
145views Database» more  BTW 2009»
15 years 11 months ago
Retrieving Metadata for Your Local Scholarly Papers
: We present a novel approach to retrieve metadata to scholarly papers stored locally as PDF files. A fingerprint is produced from the PDF fulltext to query an online metadata repo...
David Aumüller
« Prev « First page 2116 / 2200 Last » Next »