Sciweavers

2747 search results - page 480 / 550
» Non-oblivious Strategy Improvement
Sort
View
78
Voted
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
15 years 2 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
123
Voted
ASSETS
2006
ACM
15 years 2 months ago
Where's my stuff?: design and evaluation of a mobile system for locating lost items for the visually impaired
Finding lost items is a common problem for the visually impaired and is something that computing technology can help alleviate. In this paper, we present the design and evaluation...
Julie A. Kientz, Shwetak N. Patel, Arwa Z. Tyebkha...
109
Voted
DAGM
2006
Springer
15 years 2 months ago
Linear vs. Nonlinear Feature Combination for Saliency Computation: A Comparison with Human Vision
In the heart of the computer model of visual attention, an interest or saliency map is derived from an input image in a process that encompasses several data combination steps. Whi...
Nabil Ouerhani, Alexandre Bur, Heinz Hügli
89
Voted
FINTAL
2006
15 years 2 months ago
Statistical Machine Translation of German Compound Words
Abstract. German compound words pose special problems to statistical machine translation systems: the occurence of each of the components in the training data is not sufficient for...
Maja Popovic, Daniel Stein, Hermann Ney
105
Voted
FM
2006
Springer
133views Formal Methods» more  FM 2006»
15 years 2 months ago
Enforcer - Efficient Failure Injection
Non-determinism of the thread schedule is a well-known problem in concurrent programming. However, other sources of non-determinism exist which cannot be controlled by an applicati...
Cyrille Artho, Armin Biere, Shinichi Honiden