Sciweavers

1687 search results - page 226 / 338
» Which pointer analysis should I use
Sort
View
DAC
2010
ACM
15 years 8 months ago
Cost-aware three-dimensional (3D) many-core multiprocessor design
The emerging three-dimensional integrated circuit (3D IC) is beneficial for various applications from both area and performance perspectives. While the general trend in processor...
Jishen Zhao, Xiangyu Dong, Yuan Xie
EUC
2007
Springer
15 years 8 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...
COST
2008
Springer
157views Multimedia» more  COST 2008»
15 years 6 months ago
Multimodal Human Machine Interactions in Virtual and Augmented Reality
Virtual worlds are developing rapidly over the internet. They are visited by avatars and staffed with Embodied Conversational Agents (ECAs). An avatar is a representation of a phys...
Gérard Chollet, Anna Esposito, Annie Gentes...
IJCAI
2007
15 years 5 months ago
Privacy and Artificial Agents, or, Is Google Reading My Email?
We investigate legal and philosophical notions of privacy in the context of artificial agents. Our analysis utilizes a normative account of privacy that defends its value and the ...
Samir Chopra, Laurence White
NIPS
2007
15 years 5 months ago
Cluster Stability for Finite Samples
Over the past few years, the notion of stability in data clustering has received growing attention as a cluster validation criterion in a sample-based framework. However, recent w...
Ohad Shamir, Naftali Tishby