Sciweavers

3898 search results - page 470 / 780
» On the Bit Extraction Problem
Sort
View
CIKM
2001
Springer
15 years 9 months ago
Towards Speech as a Knowledge Resource
Speech is a tantalizing mode of human communication. On one hand, humans understand speech with ease and use speech to express complex ideas, information, and knowledge. On the ot...
Eric W. Brown, Savitha Srinivasan, Anni Coden, Dul...
ICRA
2000
IEEE
108views Robotics» more  ICRA 2000»
15 years 9 months ago
High Accuracy Navigation Using Laser Range Sensors in Outdoor Applications
This paper presents the design of a high accuracy outdoor navigation system based on standard dead reckoning sensors and laser range and bearing information. The data validation p...
José E. Guivant, Eduardo Mario Nebot, Stefa...
130
Voted
IJCNN
2000
IEEE
15 years 9 months ago
Sensitivity Analysis for Conic Section Function Neural Networks
Sensitivity analysis is a method for extracting the cause and effect relationship between the inputs and outputs of the network. After training a neural network, one may want to k...
Lale Özyilmaz, Tülay Yildirim
136
Voted
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
15 years 9 months ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir
CL
2000
Springer
15 years 9 months ago
Proving Failure in Functional Logic Programs
How to extract negative information from programs is an important issue in logic programming. Here we address the problem for functional logic programs, from a proof-theoretic pers...
Francisco Javier López-Fraguas, Jaime S&aac...