Sciweavers

223 search results - page 30 / 45
» A Performance Evaluation of OID Mapping Techniques
Sort
View
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 7 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
107
Voted
SEMWEB
2009
Springer
15 years 7 months ago
ASMOV: Results for OAEI 2009
The Automated Semantic Mapping of Ontologies with Validation (ASMOV) algorithm for ontology alignment was one of the top performing algorithms in the 2007 and 2008 Ontology Alignme...
Yves R. Jean-Mary, E. Patrick Shironoshita, Mansur...
98
Voted
ACMSE
2006
ACM
15 years 6 months ago
Mobility models for vehicular ad hoc network simulations
: There is a growing interest in deployment and evaluation of routing protocols for Vehicular Ad-Hoc Wireless Networks (VANETs) in urban contexts. The mobility model of nodes is on...
Niranjan Potnis, Atulya Mahajan
145
Voted
DICTA
2009
14 years 10 months ago
Context-Based Appearance Descriptor for 3D Human Pose Estimation from Monocular Images
In this paper we propose a novel appearance descriptor for 3D human pose estimation from monocular images using a learning-based technique. Our image-descriptor is based on the int...
Suman Sedai, Mohammed Bennamoun, Du Q. Huynh
118
Voted
SSD
1999
Springer
106views Database» more  SSD 1999»
15 years 4 months ago
XZ-Ordering: A Space-Filling Curve for Objects with Spatial Extension
There is an increasing need to integrate spatial index structures into commercial database management systems. In geographic information systems (GIS), huge amounts of information ...
Christian Böhm, Gerald Klump, Hans-Peter Krie...