Sciweavers

2631 search results - page 260 / 527
» Less is More
Sort
View
AAAI
2012
13 years 6 months ago
Security Games for Controlling Contagion
Many strategic actions carry a ‘contagious’ component beyond the immediate locale of the effort itself. Viral marketing and peacekeeping operations have both been observed to ...
Jason Tsai, Thanh H. Nguyen, Milind Tambe
ICCV
2009
IEEE
1425views Computer Vision» more  ICCV 2009»
16 years 6 months ago
Fast Ray Features for Learning Irregular Shapes
We introduce a new class of image features, the Ray feature set, that consider image characteristics at distant contour points, capturing information which is difficult to repre...
Kevin Smith, Alan Carleton, Vincent Lepetit
MOBISYS
2005
ACM
16 years 3 months ago
The Horus WLAN location determination system
We present the design and implementation of the Horus WLAN location determination system. The design of the Horus system aims at satisfying two goals: high accuracy and low comput...
Moustafa Youssef, Ashok K. Agrawala
HIPEAC
2009
Springer
15 years 10 months ago
Finding Stress Patterns in Microprocessor Workloads
Power consumption has emerged as a key design concern across the entire computing range, from low-end embedded systems to high-end supercomputers. Understanding the power character...
Frederik Vandeputte, Lieven Eeckhout
135
Voted
SACRYPT
2009
Springer
141views Cryptology» more  SACRYPT 2009»
15 years 10 months ago
Cryptanalysis of Dynamic SHA(2)
In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash fun...
Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan ...