Sciweavers

2631 search results - page 230 / 527
» Less is More
Sort
View
101
Voted
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 8 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
92
Voted
BSN
2009
IEEE
121views Sensor Networks» more  BSN 2009»
15 years 8 months ago
Using Heart Rate Monitors to Detect Mental Stress
— This article describes an approach to detecting mental stress using unobtrusive wearable sensors. The approach relies on estimating the state of the autonomic nervous system fr...
Jongyoon Choi, Ricardo Gutierrez-Osuna
107
Voted
RTCSA
2009
IEEE
15 years 7 months ago
Multi-path Planning for Mobile Element to Prolong the Lifetime of Wireless Sensor Networks
Mobile elements, which can traverse the deployment area and convey the observed data from static sensor nodes to a base station, have been introduced for energy efficient data co...
Dakai Zhu, Yifeng Guo, Ali Saman Tosun
123
Voted
ICRA
2009
IEEE
147views Robotics» more  ICRA 2009»
15 years 7 months ago
Generating Robot/Agent backchannels during a storytelling experiment
Abstract— This work presents the development of a realtime framework for the research of Multimodal Feedback of Robots/Talking Agents in the context of Human Robot Interaction (H...
Sames Al Moubayed, Malek Baklouti, Mohamed Chetoua...
76
Voted
CIKM
2009
Springer
15 years 7 months ago
Graph-based seed selection for web-scale crawlers
One of the most important steps in web crawling is determining the starting points, or seed selection. This paper identifies and explores the problem of seed selection in webscal...
Shuyi Zheng, Pavel Dmitriev, C. Lee Giles