Sciweavers

457 search results - page 67 / 92
» A relative trust-region algorithm for independent component ...
Sort
View
DIS
2007
Springer
15 years 3 months ago
A Hilbert Space Embedding for Distributions
We describe a technique for comparing distributions without the need for density estimation as an intermediate step. Our approach relies on mapping the distributions into a reprodu...
Alexander J. Smola, Arthur Gretton, Le Song, Bernh...
BMCBI
2008
170views more  BMCBI 2008»
14 years 9 months ago
Evaluation of GO-based functional similarity measures using S. cerevisiae protein interaction and expression profile data
Background: Researchers interested in analysing the expression patterns of functionally related genes usually hope to improve the accuracy of their results beyond the boundaries o...
Tao Xu, LinFang Du, Yan Zhou
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
15 years 3 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
UIST
2004
ACM
15 years 3 months ago
Visual tracking of bare fingers for interactive surfaces
Visual tracking of bare fingers allows more direct manipulation of digital objects, multiple simultaneous users interacting with their two hands, and permits the interaction on l...
Julien Letessier, François Bérard
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 1 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...