Sciweavers

1993 search results - page 176 / 399
» Analysis of the Effectiveness of G3PARM Algorithm
Sort
View
68
Voted
SAMOS
2007
Springer
15 years 4 months ago
A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and
Abstract— This paper explores the resistance of MOS Current Mode Logic (MCML) against Differential Power Analysis (DPA) attacks. Circuits implemented in MCML, in fact, have uniqu...
Francesco Regazzoni, Stéphane Badel, Thomas...
MM
2003
ACM
205views Multimedia» more  MM 2003»
15 years 3 months ago
AVE: automated home video editing
In this paper, we present a system that automates home video editing. This system automatically extracts a set of highlight segments from a set of raw home videos and aligns them ...
Xian-Sheng Hua, Lie Lu, HongJiang Zhang
105
Voted
CAINE
2009
14 years 8 months ago
Clustering Customer Transactions: A Rough Set Based Approach
An efficient customer behavior analysis is important for good Recommender System. Customer transaction clustering is usually the first step towards the analysis of customer behavi...
Arunava Saha, Darsana Das, Dipanjan Karmakar, Dili...
ICDAR
2011
IEEE
13 years 9 months ago
A Table Detection Method for Multipage PDF Documents via Visual Seperators and Tabular Structures
—Table detection is always an important task of document analysis and recognition. In this paper, we propose a novel and effective table detection method via visual separators an...
Jing Fang, Liangcai Gao, Kun Bai, Ruiheng Qiu, Xin...
71
Voted
GECCO
2000
Springer
15 years 1 months ago
Sampling Bias and Search Space Boundary Extension in Real Coded Genetic Algorithms
In Real coded genetic algorithms, some crossover operators do not work well on functions which have their optimum at the corner of the search space. To cope with this problem, we ...
Shigeyoshi Tsutsui