Sciweavers

6187 search results - page 1044 / 1238
» Practical Software Measurement
Sort
View
IMA
2009
Springer
221views Cryptology» more  IMA 2009»
15 years 10 months ago
Cache Timing Analysis of LFSR-Based Stream Ciphers
Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated ag...
Gregor Leander, Erik Zenner, Philip Hawkes
128
Voted
ISVC
2009
Springer
15 years 10 months ago
LightShop: An Interactive Lighting System Incorporating the 2D Image Editing Paradigm
Lighting is a fundamental and important process in the 3D animation pipeline. Conventional lighting workflow is time-consuming and labor-intensive. A user must fiddle with a rang...
Younghui Kim, Junyong Noh
COMPGEOM
2009
ACM
15 years 10 months ago
Incremental construction of the delaunay triangulation and the delaunay graph in medium dimension
We describe a new implementation of the well-known incremental algorithm for constructing Delaunay triangulations in any dimension. Our implementation follows the exact computing ...
Jean-Daniel Boissonnat, Olivier Devillers, Samuel ...
110
Voted
GROUP
2009
ACM
15 years 10 months ago
Is Wikipedia growing a longer tail?
Wikipedia has millions of articles, many of which receive little attention. One group of Wikipedians believes these obscure entries should be removed because they are uninterestin...
Shyong K. Lam, John Riedl
132
Voted
HT
2009
ACM
15 years 10 months ago
Statistical properties of inter-arrival times distribution in social tagging systems
Folksonomies provide a rich source of data to study social patterns taking place on the World Wide Web. Here we study the temporal patterns of users’ tagging activity. We show t...
Andrea Capocci, Andrea Baldassarri, Vito Domenico ...
« Prev « First page 1044 / 1238 Last » Next »