Sciweavers

585 search results - page 117 / 117
» Very Large Scale Information Retrieval
Sort
View
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
14 years 3 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
CIVR
2007
Springer
210views Image Analysis» more  CIVR 2007»
14 years 13 days ago
Semantic video analysis for psychological research on violence in computer games
In this paper, we present an automatic semantic video analysis system to support interdisciplinary research efforts in the field of psychology and media science. The psychological...
Markus Mühling, Ralph Ewerth, Thilo Stadelman...
FAST
2008
13 years 8 months ago
Pergamum: Replacing Tape with Energy Efficient, Reliable, Disk-Based Archival Storage
As the world moves to digital storage for archival purposes, there is an increasing demand for reliable, lowpower, cost-effective, easy-to-maintain storage that can still provide ...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller,...
KDD
2012
ACM
217views Data Mining» more  KDD 2012»
11 years 8 months ago
Cross-domain collaboration recommendation
Interdisciplinary collaborations have generated huge impact to society. However, it is often hard for researchers to establish such cross-domain collaborations. What are the patte...
Jie Tang, Sen Wu, Jimeng Sun, Hang Su
WWW
2007
ACM
14 years 7 months ago
Is high-quality vod feasible using P2P swarming?
Peer-to-peer technologies are increasingly becoming the medium of choice for delivering media content, both professional and homegrown, to large user populations. Indeed, current ...
Siddhartha Annapureddy, Saikat Guha, Christos Gkan...