Sciweavers

2478 search results - page 419 / 496
» Universality in two dimensions
Sort
View
PUC
2007
152views more  PUC 2007»
14 years 10 months ago
Back to the shed: gendered visions of technology and domesticity
One of the tropes of the age of ubiquitous computing is the migration of computation into new spaces. Domestic environments have been a particular focus of attention for many. Howe...
Genevieve Bell, Paul Dourish
85
Voted
TPDS
2010
159views more  TPDS 2010»
14 years 9 months ago
Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks
The circular sensing model has been widely used to estimate performance of sensing applications in existing analysis and simulations. While this model provides valuable high-level...
Joengmin Hwang, Tian He, Yongdae Kim
ASIACRYPT
2010
Springer
14 years 9 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
CORR
2010
Springer
139views Education» more  CORR 2010»
14 years 6 months ago
Data Cleaning and Query Answering with Matching Dependencies and Matching Functions
Matching dependencies were recently introduced as declarative rules for data cleaning and entity resolution. Enforcing a matching dependency on a database instance identifies the ...
Leopoldo E. Bertossi, Solmaz Kolahi, Laks V. S. La...
ML
2010
ACM
163views Machine Learning» more  ML 2010»
14 years 5 months ago
Classification with guaranteed probability of error
We introduce a general-purpose learning machine that we call the Guaranteed Error Machine, or GEM, and two learning algorithms, a real GEM algorithm and an ideal GEM algorithm. Th...
Marco C. Campi