Sciweavers

3674 search results - page 288 / 735
» Information Dependencies
Sort
View
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
15 years 6 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
89
Voted
ISMIR
2005
Springer
150views Music» more  ISMIR 2005»
15 years 6 months ago
Comparing Pitch Spelling Algorithms
A pitch spelling algorithm predicts the pitch names of the notes in a musical passage when given the onset-time, MIDI note number and possibly the duration and voice of each note....
David Meredith, Geraint A. Wiggins
DAC
2004
ACM
15 years 6 months ago
Parametric yield estimation considering leakage variability
Leakage current has become a stringent constraint in today’s processor designs in addition to traditional constraints on frequency. Since leakage current exhibits a strong inver...
Rajeev R. Rao, Anirudh Devgan, David Blaauw, Denni...
120
Voted
SIGMOD
2004
ACM
153views Database» more  SIGMOD 2004»
15 years 6 months ago
Spatially-decaying aggregation over a network: model and algorithms
Data items are often associated with a location in which they are present or collected, and their relevance or in uence decays with their distance. Aggregate values over such data...
Edith Cohen, Haim Kaplan
CGI
2003
IEEE
15 years 6 months ago
Rendering Artistic and Believable Trees for Cartoon Animation
We present a novel approach to design artistic and believable trees in a cartoon-like style, which can be rendered by an animated camera to produce a convincing 3D-like experience...
Fabian Di Fiore, William Van Haevre, Frank Van Ree...