Sciweavers

5005 search results - page 921 / 1001
» The Design and Analysis of Parallel Algorithms
Sort
View
133
Voted
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
15 years 4 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
MM
2010
ACM
208views Multimedia» more  MM 2010»
15 years 3 months ago
A new approach to cross-modal multimedia retrieval
The problem of joint modeling the text and image components of multimedia documents is studied. The text component is represented as a sample from a hidden topic model, learned wi...
Nikhil Rasiwasia, Jose Costa Pereira, Emanuele Cov...
128
Voted
MM
2010
ACM
209views Multimedia» more  MM 2010»
15 years 3 months ago
The IMMED project: wearable video monitoring of people with age dementia
In this paper, we describe a new application for multimedia indexing, using a system that monitors the instrumental activities of daily living to assess the cognitive decline caus...
Rémi Mégret, Vladislavs Dovgalecs, H...
126
Voted
AUTOMATICA
2008
134views more  AUTOMATICA 2008»
15 years 3 months ago
Probabilistic reachability and safety for controlled discrete time stochastic hybrid systems
In this work, probabilistic reachability over a finite horizon is investigated for a class of discrete time stochastic hybrid systems with control inputs. A suitable embedding of ...
Alessandro Abate, Maria Prandini, John Lygeros, Sh...
161
Voted
CORR
2008
Springer
175views Education» more  CORR 2008»
15 years 3 months ago
Energy Aware Self-Organizing Density Management in Wireless Sensor Networks
Energy consumption is the most important factor that determines sensor node lifetime. The optimization of wireless sensor network lifetime targets not only the reduction of energy...
Erwan Le Merrer, Vincent Gramoli, Anne-Marie Kerma...