Sciweavers

42388 search results - page 8255 / 8478
» Classification Using Information
Sort
View
110
Voted
FDTC
2009
Springer
126views Cryptology» more  FDTC 2009»
15 years 10 months ago
WDDL is Protected against Setup Time Violation Attacks
—In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful t...
Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Ta...
GECCO
2009
Springer
103views Optimization» more  GECCO 2009»
15 years 10 months ago
Why evolution is not a good paradigm for program induction: a critique of genetic programming
We revisit the roots of Genetic Programming (i.e. Natural Evolution), and conclude that the mechanisms of the process of evolution (i.e. selection, inheritance and variation) are ...
John R. Woodward, Ruibin Bai
ICB
2009
Springer
194views Biometrics» more  ICB 2009»
15 years 10 months ago
FM Model Based Fingerprint Reconstruction from Minutiae Template
Minutiae-based representation is the most widely adopted fingerprint representation scheme. The compactness of minutiae template has created an impression that the minutiae templa...
Jianjiang Feng, Anil K. Jain
ICCCI
2009
Springer
15 years 10 months ago
SemCards: A New Representation for Realizing the Semantic Web
Abstract. The Semantic Web promises increased precision in automated information sorting, searching, organizing and summarizing. Realizing this requires significantly more reliabl...
Kristinn R. Thórisson, Nova Spivack, James ...
ICIDS
2009
Springer
15 years 10 months ago
Say Anything: A Demonstration of Open Domain Interactive Digital Storytelling
Say Anything is a text-based interactive digital storytelling application that differs from other systems in its emphasis on the ability of users to create a narrative in any domai...
Reid Swanson, Andrew S. Gordon
« Prev « First page 8255 / 8478 Last » Next »