Sciweavers

5234 search results - page 307 / 1047
» Method Components - Rationale Revealed
Sort
View
ECSQARU
2003
Springer
15 years 9 months ago
Computational-Workload Based Binarization and Partition of Qualitative Markov Trees for Belief Combination
Abstract. Binary join trees have been a popular structure to compute the impact of multiple belief functions initially assigned to nodes of trees or networks. Shenoy has proposed t...
Weiru Liu, Xin Hong, Kenneth Adamson
KDD
2009
ACM
165views Data Mining» more  KDD 2009»
15 years 9 months ago
Pricing guidance in ad sale negotiations: the PrintAds example
We consider negotiations between publishers and advertisers in a marketplace for ads. Motivated by Google’s online PrintAds system which is such a marketplace, we focus on the r...
Adam Isaac Juda, S. Muthukrishnan, Ashish Rastogi
WISA
2009
Springer
15 years 9 months ago
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlatio...
Timo Kasper, David Oswald, Christof Paar
ASSETS
2000
ACM
15 years 8 months ago
A study of blind drawing practice: creating graphical information without the visual channel
Existing drawing tools for blind users give inadequate contextual feedback on the state of the drawing, leaving blind users unable to comprehend and successfully produce graphical...
Hesham M. Kamel, James A. Landay
ACISP
1998
Springer
15 years 8 months ago
Detecting Key-Dependencies
The confidentiality of encrypted data depends on how well the key under which it was encrypted is maintained. If a session key was exchanged encrypted under a long-term key, exposu...
Tage Stabell-Kulø, Arne Helme, Gianluca Din...