Sciweavers

5580 search results - page 926 / 1116
» Meta-level Information Extraction
Sort
View
AIME
2005
Springer
15 years 10 months ago
Electrocardiographic Imaging: Towards Automated Interpretation of Activation Maps
Abstract. In present clinical practice, information about the heart electrical activity is routinely gathered through ECG’s, which record electrical potential from just nine site...
Liliana Ironi, Stefania Tentoni
CAISE
2005
Springer
15 years 10 months ago
Estimating Recall and Precision for Vague Queries in Databases
In vague queries, a user enters a value that represents some real world object and expects as the result the set of database values that represent this real world object even with ...
Raquel Kolitski Stasiu, Carlos A. Heuser, Roberto ...
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
15 years 10 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
DRM
2005
Springer
15 years 10 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
DRMTICS
2005
Springer
15 years 10 months ago
Algorithms to Watermark Software Through Register Allocation
Software security is a significant issue in the Internet age. In order to prevent software from piracy and unauthorized modification, many techniques have been developed. Softwar...
William Zhu, Clark D. Thomborson