Sciweavers

3224 search results - page 607 / 645
» Review of Affective Computing
Sort
View
CHES
2009
Springer
239views Cryptology» more  CHES 2009»
16 years 11 days ago
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its ph...
François-Xavier Standaert, Mathieu Renauld,...
MOBISYS
2009
ACM
16 years 11 days ago
Sensor selection for energy-efficient ambulatory medical monitoring
Epilepsy affects over three million Americans of all ages. Despite recent advances, more than 20% of individuals with epilepsy never achieve adequate control of their seizures. Th...
Eugene Shih, Ali H. Shoeb, John V. Guttag
KDD
2006
ACM
159views Data Mining» more  KDD 2006»
16 years 7 days ago
Global distance-based segmentation of trajectories
This work introduces distance-based criteria for segmentation of object trajectories. Segmentation leads to simplification of the original objects into smaller, less complex primi...
Aris Anagnostopoulos, Michail Vlachos, Marios Hadj...
KDD
2002
ACM
183views Data Mining» more  KDD 2002»
16 years 7 days ago
E-CAST: A Data Mining Algorithm for Gene Expression Data
Data clustering methods have been proven to be a successful data mining technique in the analysis of gene expression data. The Cluster affinity search technique (CAST) developed b...
Abdelghani Bellaachia, David Portnoy, Yidong Chen,...
VLSID
2008
IEEE
150views VLSI» more  VLSID 2008»
16 years 6 days ago
PTSMT: A Tool for Cross-Level Power, Performance, and Thermal Exploration of SMT Processors
Simultaneous Multi-Threading (SMT) processors are becoming popular because they exploit both instruction-level and threadlevel parallelism by issuing instructions from different t...
Deepa Kannan, Aseem Gupta, Aviral Shrivastava, Nik...