Sciweavers

5575 search results - page 946 / 1115
» Information Extraction
Sort
View
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
15 years 10 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
DRMTICS
2005
Springer
15 years 10 months ago
Algorithms to Watermark Software Through Register Allocation
Software security is a significant issue in the Internet age. In order to prevent software from piracy and unauthorized modification, many techniques have been developed. Softwar...
William Zhu, Clark D. Thomborson
EMMCVPR
2005
Springer
15 years 10 months ago
A New Implicit Method for Surface Segmentation by Minimal Paths: Applications in 3D Medical Images
Abstract. We introduce a novel implicit approach for single object segmentation in 3D images. The boundary surface of this object is assumed to contain two known curves (the constr...
Roberto Ardon, Laurent D. Cohen, Anthony J. Yezzi
ICIAR
2005
Springer
15 years 10 months ago
Color Indexing by Nonparametric Statistics
A method for color indexing is proposed that is based upon nonparametric statistical techniques. Nonparametrics compare the ordinal rankings of sample populations, and maintain the...
Ian Fraser, Michael A. Greenspan
107
Voted
IMR
2005
Springer
15 years 10 months ago
A Computational Framework for Generating Sizing Function in Assembly Meshing
This paper proposes a framework for generating sizing function in meshing assemblies. Size control is crucial in obtaining a high-quality mesh with a reduced number of elements, w...
William Roshan Quadros, Ved Vyas, Michael L. Brewe...