Sciweavers

8600 search results - page 1490 / 1720
» Measuring with Timed Patterns
Sort
View
CACM
2010
161views more  CACM 2010»
15 years 2 months ago
Efficiently searching for similar images
As it becomes increasingly viable to capture, store, and share large amounts of image and video data, automatic image analysis is crucial to managing visual information. Many prob...
Kristen Grauman
119
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
135
Voted
BMVC
2010
15 years 1 months ago
Manifold Learning for Multi-Modal Image Registration
The standard approach to multi-modal registration is to apply sophisticated similarity metrics such as mutual information. The disadvantage of these measures, in contrast to simpl...
Christian Wachinger, Nassir Navab
CASES
2010
ACM
15 years 1 months ago
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software
The Advanced Encryption Standard is used in almost every new embedded application that needs a symmetric-key cipher. In such embedded applications, high-performance as well as res...
Ambuj Sinha, Zhimin Chen, Patrick Schaumont
127
Voted
GLOBECOM
2010
IEEE
15 years 1 months ago
Equitable Energy Consumption during Repeated Transmissions in a Multihop Wireless Network
This paper addresses the issue of network life during repeated broadcasts originating from the same source in large, strip-shaped wireless sensor networks. The proposed technique w...
Aravind Kailas, Mary Ann Ingram
« Prev « First page 1490 / 1720 Last » Next »