Sciweavers

1548 search results - page 237 / 310
» Estimating Software Vulnerabilities
Sort
View
KI
2008
Springer
14 years 11 months ago
Visual-Based Emotion Detection for Natural Man-Machine Interaction
Abstract. The demand for humanoid robots as service robots for everyday life has increased during the last years. The processing power of the hardware and the development of comple...
Samuel Strupp, Norbert Schmitz, Karsten Berns
CORR
2004
Springer
125views Education» more  CORR 2004»
14 years 11 months ago
Word Sense Disambiguation by Web Mining for Word Co-occurrence Probabilities
This paper describes the National Research Council (NRC) Word Sense Disambiguation (WSD) system, as applied to the English Lexical Sample (ELS) task in Senseval-3. The NRC system ...
Peter D. Turney
IEEEHPCS
2010
14 years 9 months ago
An FPGA design for the stochastic Greenberg-Hastings cellular automata
The stochastic Greenberg-Hastings cellular automaton is a model that mimics the propagation of reaction-diffusion waves in active media. Notably, this model undergoes a phase tran...
Nikolaos Vlassopoulos, Nazim Fatès, Hugues ...
CISC
2009
Springer
186views Cryptology» more  CISC 2009»
14 years 9 months ago
Hardware Framework for the Rabbit Stream Cipher
Rabbit is a software-oriented synchronous stream cipher with very strong security properties and support for 128-bit keys. Rabbit is part of the European Union's eSTREAM portf...
Deian Stefan
COMGEO
2010
ACM
14 years 8 months ago
Implementing a Bayesian approach to criminal geographic profiling
The geographic profiling problem is to create an operationally useful estimate of the location of the home base of a serial criminal from the known locations of the offense sites....
Mike O'Leary