Sciweavers

7835 search results - page 1387 / 1567
» Software are Processes Too
Sort
View
CHES
2008
Springer
144views Cryptology» more  CHES 2008»
15 years 7 months ago
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
Abstract. This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate...
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Ak...
127
Voted
CHINZ
2005
ACM
15 years 7 months ago
InkKit: a generic design tool for the tablet PC
In this paper, we describe the design philosophy, implementation and evaluation of InkKit, an informal design platform that uses pen input on a tablet PC to imitate the informalit...
Ronald Chung, Petrut Mirica, Beryl Plimmer
169
Voted
DIAGRAMS
2010
Springer
15 years 6 months ago
Diagram Editing on Interactive Displays Using Multi-touch and Pen Gestures
Creating and editing graphs and node-link diagrams by means of digital tools are crucial activities in domains such as software or business process modeling. However, these tools h...
Mathias Frisch, Jens Heydekorn, Raimund Dachselt
150
Voted
CIVR
2008
Springer
127views Image Analysis» more  CIVR 2008»
15 years 6 months ago
Performance evaluation of relevance feedback methods
In this paper we review the evaluation of relevance feedback methods for content-based image retrieval systems. We start out by presenting an overview of current common practice, ...
Mark J. Huiskes, Michael S. Lew
145
Voted
CLEF
2008
Springer
15 years 6 months ago
Robust Question Answering for Speech Transcripts: UPC Experience in QAst 2008
This paper describes the participation of the Technical University of Catalonia in the CLEF 2008 Question Answering on Speech Transcripts track. We have participated in the Englis...
Pere Comas, Jordi Turmo
« Prev « First page 1387 / 1567 Last » Next »