Sciweavers

1396 search results - page 168 / 280
» aim 2006
Sort
View
ICDM
2009
IEEE
205views Data Mining» more  ICDM 2009»
15 years 7 months ago
Active Selection of Sensor Sites in Remote Sensing Applications
— In a data-mining approach, a model for estimation of Aerosol Optical Depth (AOD) from satellite observations is learned using collocated satellite and groundbased observations....
Debasish Das, Zoran Obradovic, Slobodan Vucetic
93
Voted
MICRO
2009
IEEE
159views Hardware» more  MICRO 2009»
15 years 7 months ago
Adaptive line placement with the set balancing cache
Efficient memory hierarchy design is critical due to the increasing gap between the speed of the processors and the memory. One of the sources of inefficiency in current caches is...
Dyer Rolán, Basilio B. Fraguela, Ramon Doal...
90
Voted
INDOCRYPT
2009
Springer
15 years 7 months ago
RFID Distance Bounding Multistate Enhancement
Distance bounding protocols aim at avoiding relay attacks during an authentication process. They are particularly awaited in RFID, where mounting a relay attack between a lowcapabi...
Gildas Avoine, Christian Floerkemeier, Benjamin Ma...
106
Voted
CLEF
2007
Springer
15 years 6 months ago
Overview of the CLEF 2007 Multilingual Question Answering Track
The fifth QA campaign at CLEF, the first having been held in 2006. was characterized by continuity with the past and at the same time by innovation. In fact, topics were introduce...
Danilo Giampiccolo, Pamela Forner, Jesús He...
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
15 years 6 months ago
How Should We Solve Search Problems Privately?
Abstract. Secure multiparty computation allows a group of distrusting parties to jointly compute a (possibly randomized) function of their inputs. However, it is often the case tha...
Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinre...