Sciweavers

503 search results - page 20 / 101
» If not now, when
Sort
View
109
Voted
HICSS
2011
IEEE
179views Biometrics» more  HICSS 2011»
14 years 4 months ago
EventGraphs: Charting Collections of Conference Connections
EventGraphs are social media network diagrams of conversations related to events, such as conferences. Many conferences now communicate a common “hashtag” or keyword to identi...
Derek L. Hansen, Marc A. Smith, Ben Shneiderman
108
Voted
EUROCRYPT
2009
Springer
16 years 1 months ago
Cube Attacks on Tweakable Black Box Polynomials
Almost any cryptographic scheme can be described by tweakable polynomials over GF(2), which contain both secret variables (e.g., key bits) and public variables (e.g., plaintext bit...
Itai Dinur, Adi Shamir
141
Voted
TSMC
2002
107views more  TSMC 2002»
15 years 11 days ago
Guaranteed robust nonlinear estimation with application to robot localization
When reliable prior bounds on the acceptable errors between the data and corresponding model outputs are available, bounded-error estimation techniques make it possible to characte...
Luc Jaulin, Michel Kieffer, Eric Walter, Dominique...
105
Voted
IFL
2007
Springer
141views Formal Methods» more  IFL 2007»
15 years 7 months ago
Partial Parsing: Combining Choice with Commitment
Abstract. Parser combinators, often monadic, are a venerable and widelyused solution to read data from some external format. However, the capability to return a partial parse has, ...
Malcolm Wallace
76
Voted
ICC
2007
IEEE
15 years 7 months ago
Reducing the Size of Rule Set in a Firewall
— A firewall’s complexity is known to increase with the size of its rule set. Complex firewalls are more likely to have configuration errors which cause security loopholes. ...
MyungKeun Yoon, Shigang Chen, Zhan Zhang