Sciweavers

1583 search results - page 200 / 317
» Standardization and Competitive Advantage
Sort
View
PKC
2009
Springer
102views Cryptology» more  PKC 2009»
15 years 10 months ago
A Practical Key Recovery Attack on Basic TCHo
TCHo is a public key encryption scheme based on a stream cipher component, which is particular suitable for low cost devices like RFIDs. In its basic version, TCHo offers no IND-CC...
Mathias Herrmann, Gregor Leander
CHI
2008
ACM
15 years 10 months ago
MightyTrace: multiuser tracking technology on lc-displays
In this paper, we present a new technology to perform multi Tangible User Interface (TUI) tracking on standard LCdisplays. A lot of existing technologies for tangible user interfa...
Ramon Hofer, Patrick Kaplan, Andreas Kunz
SIGMOD
2003
ACM
145views Database» more  SIGMOD 2003»
15 years 10 months ago
Containment Join Size Estimation: Models and Methods
Recent years witnessed an increasing interest in researches in XML, partly due to the fact that XML has now become the de facto standard for data interchange over the internet. A ...
Wei Wang 0011, Haifeng Jiang, Hongjun Lu, Jeffrey ...
ALT
2007
Springer
15 years 7 months ago
Tuning Bandit Algorithms in Stochastic Environments
Algorithms based on upper-confidence bounds for balancing exploration and exploitation are gaining popularity since they are easy to implement, efficient and effective. In this p...
Jean-Yves Audibert, Rémi Munos, Csaba Szepe...
CVPR
2010
IEEE
15 years 6 months ago
Efficient Additive Kernels via Explicit Feature Maps
Maji and Berg [13] have recently introduced an explicit feature map approximating the intersection kernel. This enables efficient learning methods for linear kernels to be applied...
Andrea Vedaldi, Andrew Zisserman