Sciweavers

628 search results - page 68 / 126
» Effectively Open Real Functions
Sort
View
MOBICOM
2010
ACM
15 years 3 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
ICIP
2001
IEEE
16 years 4 months ago
Synthesis and applications of lattice image operators based on fuzzy norms
In this paper we use concepts from the lattice-based theory of morphological operators and fuzzy sets to develop generalized lattice image operators that can be expressed as nonli...
Petros Maragos, Vassilis Tzouvaras, Giorgos B. Sta...
ICDE
1997
IEEE
114views Database» more  ICDE 1997»
16 years 4 months ago
Modeling Multidimensional Databases
We propose a data model and a few algebraic operations that provide semantic foundation to multidimensional databases. The distinguishing feature of the proposed model is the symm...
Rakesh Agrawal, Ashish Gupta, Sunita Sarawagi
ISBI
2008
IEEE
16 years 4 months ago
Sensitivity analysis of parcellation in the joint detection-estimation of brain activity in fMRI
Within-subject analysis in fMRI relies on both (i) a detection step to localize which parts of the brain are activated by a given stimulus type, and on (ii) an estimation step to ...
Thomas Vincent, Philippe Ciuciu, Bertrand Thirion
EUROCRYPT
2009
Springer
16 years 3 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...