Sciweavers

749 search results - page 129 / 150
» Scenario based Analysis of Linear Computations
Sort
View
PERVASIVE
2011
Springer
14 years 2 months ago
NextPlace: A Spatio-temporal Prediction Framework for Pervasive Systems
Abstract. Accurate and fine-grained prediction of future user location and geographical profile has interesting and promising applications including targeted content service, adv...
Salvatore Scellato, Mirco Musolesi, Cecilia Mascol...
SAC
2011
ACM
14 years 2 months ago
Type harvesting: a practical approach to obtaining typing information in dynamic programming languages
Dynamically typed programming languages are powerful tools for rapid software development. However, there are scenarios that would benefit from actual type information being avai...
Michael Haupt, Michael Perscheid, Robert Hirschfel...
BMCBI
2007
111views more  BMCBI 2007»
14 years 11 months ago
MotifCombinator: a web-based tool to search for combinations of cis-regulatory motifs
Background: A combination of multiple types of transcription factors and cis-regulatory elements is often required for gene expression in eukaryotes, and the combinatorial regulat...
Mamoru Kato, Tatsuhiko Tsunoda
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
15 years 6 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
15 years 5 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay