Sciweavers

1277 search results - page 246 / 256
» The Google Similarity Distance
Sort
View
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
15 years 3 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
15 years 3 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...
CICLING
2006
Springer
15 years 3 months ago
Automatic Acquisition of Semantic-Based Question Reformulations for Question Answering
Abstract. In this paper, we present a method for the automatic acquisition of semantic-based reformulations from natural language questions. Our goal is to find useful and generic ...
Jamileh Yousefi, Leila Kosseim
ALT
2003
Springer
15 years 3 months ago
Efficiently Learning the Metric with Side-Information
Abstract. A crucial problem in machine learning is to choose an appropriate representation of data, in a way that emphasizes the relations we are interested in. In many cases this ...
Tijl De Bie, Michinari Momma, Nello Cristianini
ACISICIS
2008
IEEE
15 years 1 months ago
Efficient Projection for Compressed Sensing
Compressed sensing (CS), a joint compression and sensing process, is a emerging field of activity in which the signal is sampled and simultaneously compressed at a greatly reduced...
Vo Dinh Minh Nhat, Duc Vo, Subhash Challa, Sungyou...