Sciweavers

2204 search results - page 441 / 441
» Combining Multiple Clustering Systems
Sort
View
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 2 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
CSCW
2012
ACM
12 years 14 days ago
Friends, romans, countrymen: lend me your URLs. using social chatter to personalize web search
People often find useful content on the web via social media. However, it is difficult to manually aggregate the information and recommendations embedded in a torrent of social ...
Abhinay Nagpal, Sudheendra Hangal, Rifat Reza Joye...
CVPR
2012
IEEE
11 years 7 months ago
Multi-attribute spaces: Calibration for attribute fusion and similarity search
Recent work has shown that visual attributes are a powerful approach for applications such as recognition, image description and retrieval. However, fusing multiple attribute scor...
Walter J. Scheirer, Neeraj Kumar, Peter N. Belhume...
TRECVID
2007
13 years 6 months ago
PicSOM Experiments in TRECVID 2007
Our experiments in TRECVID 2007 include participation in the high-level feature extraction, search, and video summarization tasks, using a common system framework based on multipl...
Markus Koskela, Mats Sjöberg, Ville Viitaniem...