Sciweavers

430 search results - page 56 / 86
» On Using Satisfiability-Based Pruning Techniques in Covering...
Sort
View
83
Voted
CHES
2000
Springer
111views Cryptology» more  CHES 2000»
15 years 5 months ago
How to Explain Side-Channel Leakage to Your Kids
This paper will attempt to explain some of the side-channel attack techniques in a fashion that is easily comprehensible by the layman. What follows is a presentation of three diļ¬...
David Naccache, Michael Tunstall
103
Voted
ESWS
2007
Springer
15 years 7 months ago
Scalable Web Service Composition with Partial Matches
We investigate scalable algorithms for automated composition (WSC) of Semantic Web Services. Our notion of WSC is very general: the composition semantics includes background knowl...
Adina Sirbu, Jörg Hoffmann
CVPR
2009
IEEE
1133views Computer Vision» more  CVPR 2009»
16 years 7 months ago
Hierarchical Spatio-Temporal Context Modeling for Action Recognition
The problem of recognizing actions in realistic videos is challenging yet absorbing owing to its great potentials in many practical applications. Most previous research is limit...
Jintao Li, Ju Sun, Loong Fah Cheong, Shuicheng Yan...
224
Voted
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
16 years 2 months ago
SUBSKY: Efficient Computation of Skylines in Subspaces
Given a set of multi-dimensional points, the skyline contains the best points according to any preference function that is monotone on all axes. In practice, applications that req...
Yufei Tao, Xiaokui Xiao, Jian Pei
118
Voted
KDD
2003
ACM
170views Data Mining» more  KDD 2003»
16 years 1 months ago
Efficient decision tree construction on streaming data
Decision tree construction is a well studied problem in data mining. Recently, there has been much interest in mining streaming data. Domingos and Hulten have presented a one-pass...
Ruoming Jin, Gagan Agrawal