Sciweavers

3608 search results - page 340 / 722
» computing 2011
Sort
View
IACR
2011
86views more  IACR 2011»
14 years 4 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
CVPR
2011
IEEE
14 years 9 months ago
Learning People Detection Models from Few Training Samples
People detection is an important task for a wide range of applications in computer vision. State-of-the-art methods learn appearance based models requiring tedious collection and ...
Leonid Pishchulin, Christian Wojek, Arjun Jain, Th...
CICC
2011
106views more  CICC 2011»
14 years 5 months ago
A 45nm CMOS neuromorphic chip with a scalable architecture for learning in networks of spiking neurons
Efforts to achieve the long-standing dream of realizing scalable learning algorithms for networks of spiking neurons in silicon have been hampered by (a) the limited scalability of...
Jae-sun Seo, Bernard Brezzo, Yong Liu, Benjamin D....
COMCOM
2011
15 years 4 days ago
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between ...
Leonardo B. Oliveira, Diego F. Aranha, Conrado Por...
PE
2011
Springer
274views Optimization» more  PE 2011»
14 years 11 months ago
A generalized method of moments for closed queueing networks
We introduce a new solution technique for closed product-form queueing networks that generalizes the Method of Moments (MoM), a recently proposed exact algorithm that is several o...
Giuliano Casale