Sciweavers

4101 search results - page 557 / 821
» Differential Power Analysis
Sort
View
127
Voted
DFN
2003
15 years 2 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
BMCBI
2010
125views more  BMCBI 2010»
15 years 26 days ago
Asymmetric microarray data produces gene lists highly predictive of research literature on multiple cancer types
Background: Much of the public access cancer microarray data is asymmetric, belonging to datasets containing no samples from normal tissue. Asymmetric data cannot be used in stand...
Noor B. Dawany, Aydin Tozeren
113
Voted
ICCV
2001
IEEE
16 years 2 months ago
JetStream: Probabilistic Contour Extraction with Particles
The problem of extracting continuous structures from noisy or cluttered images is a difficult one. Successful extraction depends critically on the ability to balance prior constra...
Andrew Blake, Michel Gangnet, Patrick Pérez
ICIP
2001
IEEE
16 years 2 months ago
Face detection from cluttered images using a polynomial neural network
In this paper, we propose a new method for face detection from cluttered images. We use a polynomial neural network (PNN) for separation of face and non-face patterns while the co...
Lin-Lin Huang, Akinobu Shimizu, Yoshihiro Hagihara...
77
Voted
MICCAI
2009
Springer
16 years 1 months ago
A Cluster Overlap Measure for Comparison of Activations in fMRI Studies
Abstract. Most fMRI studies use voxel-wise statistics to carry out intrasubject as well as inter-subject analysis. We show that statistics derived from voxel-wise comparisons are l...
Guillermo A. Cecchi, Rahul Garg, A. Ravishankar ...