Sciweavers

9316 search results - page 223 / 1864
» Analysis of traceback techniques
Sort
View
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
15 years 9 months ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir
DAS
2006
Springer
15 years 9 months ago
Bangla/English Script Identification Based on Analysis of Connected Component Profiles
Script identification is required for a multilingual OCR system. In this paper, we present a novel and efficient technique for Bangla/English script identification with application...
Lijun Zhou, Yue Lu, Chew Lim Tan
SIMVIS
2008
15 years 6 months ago
Feature-based Analysis of a Multi-Parameter Flow Simulation
In our work we examine a high-dimensional, massive flow data set around an airfoil using a topology-based vortex analysis. The 3D time-dependent flow depends on two additional par...
Tino Weinkauf, Jan Sahner, Bert Günther, Holg...
EJIVP
2010
107views more  EJIVP 2010»
15 years 8 days ago
Unsupervised Action Classification Using Space-Time Link Analysis
Abstract--In this paper we address the problem of unsupervised discovery of action classes in video data. Different from all existing methods thus far proposed for this task, we pr...
Haowei Liu, Rogerio Feris, Volker Krüger, Min...
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 6 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur