Sciweavers

3235 search results - page 546 / 647
» Partial Redundant Modeling
Sort
View
CRYPTO
2003
Springer
87views Cryptology» more  CRYPTO 2003»
15 years 7 months ago
Private Circuits: Securing Hardware against Probing Attacks
Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider the problem of protecting privacy in circuits, when faced with an adversary that can access ...
Yuval Ishai, Amit Sahai, David Wagner
DEXA
2003
Springer
147views Database» more  DEXA 2003»
15 years 7 months ago
Context-Aware Data Mining Framework for Wireless Medical Application
Abstract. Data mining, which aims at extracting interesting information from large collections of data, has been widely used as an effective decision making tool. Mining the datas...
Pravin Vajirkar, Sachin Singh, Yugyung Lee
EGH
2003
Springer
15 years 7 months ago
Simulation of cloud dynamics on graphics hardware
This paper presents a physically-based, visually-realistic interactive cloud simulation. Clouds in our system are modeled using partial differential equations describing fluid mot...
Mark J. Harris, William V. Baxter, Thorsten Scheue...
ER
2003
Springer
98views Database» more  ER 2003»
15 years 7 months ago
Extracting Relations from XML Documents
XML is becoming a prevalent format for data exchange. Many XML documents have complex schemas that are not always known, and can vary widely between information sources and applica...
Eugene Agichtein, C. T. Howard Ho, Vanja Josifovsk...
EUROCRYPT
2003
Springer
15 years 7 months ago
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
Perfectly secret message transmission can be realized with only partially secret and weakly correlated information shared by the parties as soon as this information allows for the ...
Renato Renner, Stefan Wolf