Sciweavers

954 search results - page 107 / 191
» From brains to bytes
Sort
View
105
Voted
JCST
2010
147views more  JCST 2010»
14 years 5 months ago
A Multi-Key Pirate Decoder Against Traitor Tracing Schemes
In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protect...
Yongdong Wu, Robert H. Deng
CCS
2011
ACM
13 years 10 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj
102
Voted
MICCAI
1999
Springer
15 years 2 months ago
Image Processing for Diffusion Tensor Magnetic Resonance Imaging
This paper1 describes image processing techniques for Diffusion Tensor Magnetic Resonance. In Diffusion Tensor MRI, a tensor describing local water diffusion is acquired for each v...
Carl-Fredrik Westin, S. E. Maier, B. Khidhir, Pete...
88
Voted
COGSCI
2008
90views more  COGSCI 2008»
14 years 9 months ago
Using fMRI to Test Models of Complex Cognition
This article investigates the potential of fMRI to test assumptions about different components in models of complex cognitive tasks. If the components of a model can be associated...
John R. Anderson, Cameron S. Carter, Jon M. Fincha...
JOCN
2010
126views more  JOCN 2010»
14 years 8 months ago
Evidence for Early Morphological Decomposition in Visual Word Recognition
■ We employ a single-trial correlational MEG analysis technique to investigate early processing in the visual recognition of morphologically complex words. Three classes of affi...
Olla Solomyak, Alec Marantz