Sciweavers

4052 search results - page 322 / 811
» Comparing Networks from a Data Analysis Perspective
Sort
View
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
15 years 10 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
AIPR
2007
IEEE
15 years 11 months ago
3D Scene Reconstruction through a Fusion of Passive Video and Lidar Imagery
Geometric structure of a scene can be reconstructed using many methods. In recent years, two prominent approaches have been digital photogrammetric analysis using passive stereo i...
Prudhvi Gurram, Stephen Lach, Eli Saber, Harvey E....
AAAI
1996
15 years 6 months ago
Post-Analysis of Learned Rules
Rule induction research implicitly assumes that after producing the rules from a dataset, these rules will be used directly by an expert system or a human user. In real-life appli...
Bing Liu, Wynne Hsu
CORR
2008
Springer
77views Education» more  CORR 2008»
15 years 4 months ago
Crowdsourcing, Attention and Productivity
We show through an analysis of a massive data set from YouTube that the productivity exhibited in crowdsourcing exhibits a strong positive dependence on attention, measured by the...
Bernardo A. Huberman, Daniel M. Romero, Fang Wu
ECOOPW
1997
Springer
15 years 8 months ago
The Object Model for a Product Based Development Process
The traditional workflow process model is typically illustrated with a graph of activities, tasks, deliverables and techniques. From an object-oriented perspective, every identifi...
Pavel Hruby