Sciweavers

3645 search results - page 582 / 729
» Implementing mapping composition
Sort
View
WWW
2010
ACM
16 years 1 days ago
Distributed nonnegative matrix factorization for web-scale dyadic data analysis on mapreduce
The Web abounds with dyadic data that keeps increasing by every single second. Previous work has repeatedly shown the usefulness of extracting the interaction structure inside dya...
Chao Liu, Hung-chih Yang, Jinliang Fan, Li-Wei He,...
ETRA
2010
ACM
221views Biometrics» more  ETRA 2010»
15 years 12 months ago
Advanced gaze visualizations for three-dimensional virtual environments
Gaze visualizations represent an effective way for gaining fast insights into eye tracking data. Current approaches do not adequately support eye tracking studies for three-dimens...
Sophie Stellmach, Lennart Nacke, Raimund Dachselt
135
Voted
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 12 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
165
Voted
AINA
2009
IEEE
15 years 12 months ago
Quantifying Artifacts of Virtualization: A Framework for Mirco-Benchmarks
One of the novel benefits of virtualization is the ability to emulate many hosts with a single physical machine. This approach is often used to support at-scale testing for large...
Chris Matthews, Yvonne Coady, Stephen Neville
SAC
2009
ACM
15 years 12 months ago
LTS semantics for use case models
Formalization is a necessary precondition for the specification of precise and unambiguous use case models, which serve as reference points for the design and implementation of so...
Daniel Sinnig, Patrice Chalin, Ferhat Khendek