Sciweavers

24680 search results - page 4532 / 4936
» Learning
Sort
View
184
Voted
ACMIDC
2010
15 years 1 months ago
vSked: an interactive visual schedule system for use in classrooms for children with autism
Children with autism often experience substantial challenges in understanding, structuring, and predicting the activities in their daily lives. The use of symbols to represent a s...
Michael T. Yeganyan, Meg Cramer, Lou Anne Boyd, Gi...
131
Voted
AIRS
2010
Springer
15 years 1 months ago
Relevance Ranking Using Kernels
This paper is concerned with relevance ranking in search, particularly that using term dependency information. It proposes a novel and unified approach to relevance ranking using ...
Jun Xu, Hang Li, Chaoliang Zhong
174
Voted
AMDO
2010
Springer
15 years 1 months ago
Multiple-Activity Human Body Tracking in Unconstrained Environments
We propose a method for human full-body pose tracking from measurements of wearable inertial sensors. Since the data provided by such sensors is sparse, noisy and often ambiguous, ...
Loren Arthur Schwarz, Diana Mateus, Nassir Navab
ASAP
2010
IEEE
315views Hardware» more  ASAP 2010»
15 years 1 months ago
A compact FPGA-based architecture for elliptic curve cryptography over prime fields
Abstract--This paper proposes an FPGA-based applicationspecific elliptic curve processor over a prime field. This research targets applications for which compactness is more import...
Jo Vliegen, Nele Mentens, Jan Genoe, An Braeken, S...
ASIACRYPT
2010
Springer
15 years 1 months ago
Leakage Resilient ElGamal Encryption
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order...
Eike Kiltz, Krzysztof Pietrzak
« Prev « First page 4532 / 4936 Last » Next »