Sciweavers

21430 search results - page 4144 / 4286
» Abstract Effective Models
Sort
View
137
Voted
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
15 years 7 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
145
Voted
CIVR
2006
Springer
189views Image Analysis» more  CIVR 2006»
15 years 7 months ago
Automatic Person Annotation of Family Photo Album
Digital photographs are replacing tradition films in our daily life and the quantity is exploding. This stimulates the strong need for efficient management tools, in which the anno...
Ming Zhao 0003, Yong Teo, Siliang Liu, Tat-Seng Ch...
126
Voted
ESAW
2000
Springer
15 years 7 months ago
Engineering Social Order
Social Order becomes a major problem in MAS and in computer mediated human interaction. After explaining the notions of Social Order and Social Control, I claim that there are mult...
Cristiano Castelfranchi
184
Voted
MICCAI
2000
Springer
15 years 7 months ago
Small Sample Size Learning for Shape Analysis of Anatomical Structures
We present a novel approach to statistical shape analysis of anatomical structures based on small sample size learning techniques. The high complexity of shape models used in medic...
Polina Golland, W. Eric L. Grimson, Martha Elizabe...
142
Voted
RTSS
2000
IEEE
15 years 7 months ago
Efficient Scheduling of Sporadic, Aperiodic, and Periodic Tasks with Complex Constraints
Many industrial applications with real-time demands are composed of mixed sets of tasks with a variety of requirements. These can be in the form of standard timing constraints, su...
Damir Isovic, Gerhard Fohler
« Prev « First page 4144 / 4286 Last » Next »