Sciweavers

1138 search results - page 50 / 228
» Talking about concerns
Sort
View
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
15 years 6 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
HICSS
2000
IEEE
147views Biometrics» more  HICSS 2000»
15 years 4 months ago
Persistence and Lurkers in Discussion Lists: A Pilot Study
In email-based discussion lists (DLs), messages resident in archives, email clients and elsewhere are persistent. One way of examining persistent messages is through the eyes of l...
Blair Nonnecke, Jennifer Preece
ICFP
1998
ACM
15 years 4 months ago
Fold and Unfold for Program Semantics
In this paper we explain how recursion operators can be used to structure and reason about program semantics within a functional language. In particular, we show how the recursion...
Graham Hutton
LLC
2011
123views more  LLC 2011»
14 years 6 months ago
Computational Phonology - Part I: Foundations
Computational phonology approaches the study of sound patterns in the world’s languages from a computational perspective. This article explains this perspective and its relevanc...
Jeffrey Heinz
CHI
2001
ACM
16 years 6 days ago
Responding to subtle, fleeting changes in the user's internal state
In human-to-human interaction, people sometimes are able to pick up and respond sensitively to the other's internal state as it shifts moment by moment over the course of an ...
Wataru Tsukahara, Nigel Ward