Sciweavers

1993 search results - page 367 / 399
» Analysis of the Effectiveness of G3PARM Algorithm
Sort
View
86
Voted
CLEF
2008
Springer
14 years 11 months ago
The Xtrieval Framework at CLEF 2008: Domain-Specific Track
This article describes our participation at the Domain-Specific track. We used the Xtrieval framework [2], [3] for the preparation and execution of the experiments. The translatio...
Jens Kürsten, Thomas Wilhelm, Maximilian Eibl
FPL
2008
Springer
157views Hardware» more  FPL 2008»
14 years 11 months ago
Chosen-message SPA attacks against FPGA-based RSA hardware implementations
This paper presents SPA (Simple Power Analysis) attacks against public-key cryptosystems implemented on an FPGA platform. The SPA attack investigates a power waveform generated by...
Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Ak...
DGO
2008
188views Education» more  DGO 2008»
14 years 11 months ago
Enabling synergy between psychology and natural language processing for e-Government: crime reporting and investigative intervie
We are developing an automated crime reporting and investigative interview system. The system incorporates cognitive interview techniques to maximize witness memory recall, and in...
Alicia Iriberri, Chih Hao Ku, Gondy Leroy
MEDIAFORENSICS
2010
14 years 11 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
92
Voted
NIPS
2008
14 years 11 months ago
Spectral Clustering with Perturbed Data
Spectral clustering is useful for a wide-ranging set of applications in areas such as biological data analysis, image processing and data mining. However, the computational and/or...
Ling Huang, Donghui Yan, Michael I. Jordan, Nina T...