Sciweavers

782 search results - page 117 / 157
» Can a Parser be Generated from Examples
Sort
View
ASIACRYPT
2009
Springer
15 years 8 months ago
PSS Is Secure against Random Fault Attacks
A fault attack consists in inducing hardware malfunctions in order to recover secrets from electronic devices. One of the most famous fault attack is Bellcore’s attack against RS...
Jean-Sébastien Coron, Avradip Mandal
128
Voted
CIKM
2001
Springer
15 years 8 months ago
Automatic Discovery of Salient Segments in Imperfect Speech Transcripts
This paper addresses the problem of automatic detection of salient video segments for real-world applications such as corporate training based on associated speech transcriptions....
Dulce B. Ponceleon, Savitha Srinivasan
115
Voted
CVPR
2000
IEEE
15 years 8 months ago
Segmentation with Invisible Keying Signal
Croma keying is the process of segmenting objects from images and video using color cues. A blue (or green) screen placed behind an object during recording is used in special effe...
Moshe Ben-Ezra
127
Voted
ICPR
2000
IEEE
15 years 8 months ago
JKanji: Wavelet-Based Interactive Kanji Completion
JKanji is an interactive character completion system that provides stroke-order-independent recognition of complex hand-written glyphs such as Japanese kanji or Chinese hanzi. As ...
Robert G. Stockton, Rahul Sukthankar
148
Voted
ICCAD
1994
IEEE
114views Hardware» more  ICCAD 1994»
15 years 7 months ago
Performance-driven synthesis of asynchronous controllers
We examine the implications of a new hazard-free combinational logic synthesis method [8], which generates multiplexor trees from binary decision diagrams (BDDs) -- representation...
Kenneth Y. Yun, Bill Lin, David L. Dill, Srinivas ...