Sciweavers

8294 search results - page 1480 / 1659
» Presenting Data from Experiments in Algorithmics
Sort
View
177
Voted
WCFLP
2005
ACM
15 years 9 months ago
Lightweight program specialization via dynamic slicing
Program slicing is a well-known technique that extracts from a program those statements which are relevant to a particular criterion. While static slicing does not consider any in...
Claudio Ochoa, Josep Silva, Germán Vidal
117
Voted
AMR
2005
Springer
117views Multimedia» more  AMR 2005»
15 years 9 months ago
Learning User Queries in Multimodal Dissimilarity Spaces
Abstract. Different strategies to learn user semantic queries from dissimilarity representations of video audio-visual content are presented. When dealing with large corpora of vi...
Eric Bruno, Nicolas Moënne-Loccoz, Sté...
150
Voted
CHES
2005
Springer
149views Cryptology» more  CHES 2005»
15 years 9 months ago
Resistance of Randomized Projective Coordinates Against Power Analysis
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
William Dupuy, Sébastien Kunz-Jacques
MM
2004
ACM
133views Multimedia» more  MM 2004»
15 years 9 months ago
Interactive retrieval of 3D shape models using physical objects
We present a novel method for interactive retrieval of 3D shapes using physical objects. Our method is based on simple physical 3D interaction with a set of tangible blocks. As th...
Hiroyasu Ichida, Yuichi Itoh, Yoshifumi Kitamura, ...
CIKM
2004
Springer
15 years 9 months ago
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained sec...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
« Prev « First page 1480 / 1659 Last » Next »