Sciweavers

1717 search results - page 108 / 344
» Error concealment using a diffusion based method
Sort
View
140
Voted
CHES
2006
Springer
117views Cryptology» more  CHES 2006»
15 years 6 months ago
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching
This paper describes high-resolution waveform matching based on a Phase-Only Correlation (POC) technique and its application for a side-channel attack. Such attacks, such as Simple...
Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafum...
138
Voted
ISBI
2011
IEEE
14 years 6 months ago
Automated lineage tree reconstruction from Caenorhabditis elegans image data using particle filtering based cell tracking
Caenorhabditis elegans is an important model organism for the study of molecular mechanisms of development and disease processes, due to its well-known genome and invariant cell l...
Noemí Carranza-Herrezuelo, Ihor Smal, Oleh ...
141
Voted
CVPR
2008
IEEE
16 years 4 months ago
Unsupervised estimation of segmentation quality using nonnegative factorization
We propose an unsupervised method for evaluating image segmentation. Common methods are typically based on evaluating smoothness within segments and contrast between them, and the...
Roman Sandler, Michael Lindenbaum
130
Voted
PG
1999
IEEE
15 years 7 months ago
Mesh Approximation Using a Volume-Based Metric
In this paper we introduce a mesh approximation method that uses a volume-based metric. After a geometric simplification, we minimize the volume between the simplified mesh and th...
Pierre Alliez, Nathalie Laurent, Henri Sanson, Fra...
103
Voted
IJSN
2006
65views more  IJSN 2006»
15 years 2 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang