Sciweavers

CLEF
2006
Springer
15 years 7 months ago
Image Retrieval and Annotation Using Maximum Entropy
I feel smaller than 10 words but should be 250 words. Categories and Subject Descriptors H.3 [Information Storage and Retrieval]: H.3.3 Information Search and Retrieval ; I.5 [Pat...
Thomas Deselaers, Tobias Weyand, Hermann Ney
CLEF
2006
Springer
15 years 7 months ago
MSRA Columbus at GeoCLEF 2006
This paper describes the participation of Columbus Project of Microsoft Research Asia (MSRA) in the GeoCLEF 2006 (a cross-language geographical retrieval track which is part of Cr...
Zhisheng Li, Chong Wang 0002, Xing Xie, Xufa Wang,...
CHES
2006
Springer
205views Cryptology» more  CHES 2006»
15 years 7 months ago
Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks
Balanced dynamic dual-rail gates and asynchronous circuits have been shown, if implemented correctly, to have natural and efficient resistance to side-channel attacks. Despite thei...
Konrad J. Kulikowski, Alexander B. Smirnov, Alexan...
CCS
2006
ACM
15 years 7 months ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...
CBSE
2006
Springer
15 years 7 months ago
On-Demand Quality-Oriented Assistance in Component-Based Software Evolution
Abstract. During an architectural evolution of a component-based software, certain quality attributes may be weakened. This is due to the lack of an explicit definition of the link...
Chouki Tibermacine, Régis Fleurquin, Salah ...