Sciweavers

5401 search results - page 871 / 1081
» Using Versions in GIS
Sort
View
ASIACRYPT
2010
Springer
15 years 2 months ago
Leakage Resilient ElGamal Encryption
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order...
Eike Kiltz, Krzysztof Pietrzak
COLT
2010
Springer
15 years 2 months ago
Convex Games in Banach Spaces
We study the regret of an online learner playing a multi-round game in a Banach space B against an adversary that plays a convex function at each round. We characterize the minima...
Karthik Sridharan, Ambuj Tewari
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
15 years 2 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...
ICDM
2010
IEEE
142views Data Mining» more  ICDM 2010»
15 years 2 months ago
Causal Discovery from Streaming Features
In this paper, we study a new research problem of causal discovery from streaming features. A unique characteristic of streaming features is that not all features can be available ...
Kui Yu, Xindong Wu, Hao Wang, Wei Ding
ICRA
2010
IEEE
138views Robotics» more  ICRA 2010»
15 years 2 months ago
GenoM3: Building middleware-independent robotic components
The topic of reusable software in robotics is now largely addressed. Components based architectures, where components are independent units that can be reused accross applications,...
Anthony Mallet, Cédric Pasteur, Matthieu He...