Sciweavers

667 search results - page 23 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
ISBI
2006
IEEE
16 years 14 days ago
Preliminary testing of sensitivity to input data quality in an elastographic reconstruction method
An elastographic reconstruction method has been developed to recover the material properties of soft tissue by modelbased analysis of image data acquired at different states of me...
Jao J. Ou, Stephanie L. Barnes, Michael I. Miga
120
Voted
ISSTA
2012
ACM
13 years 2 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
MOBIQUITOUS
2007
IEEE
15 years 6 months ago
Securing Cooperative Transmission in Wireless Communications
Abstract— Cooperative transmission is an emerging communication technique that takes advantages of spatial diversity and broadcast natures of wireless channels to improve wireles...
Zhu Han, Yan Lindsay Sun
99
Voted
ICDAR
2003
IEEE
15 years 5 months ago
A New Classifier Simulator for Evaluating Parallel Combination Methods
The use of artificial outputs generated by a classifier simulator has recently emerged as a new trend to provide an underlying evaluation of classifier combination methods. In thi...
Héla Zouari, Laurent Heutte, Yves Lecourtie...
FSE
2008
Springer
193views Cryptology» more  FSE 2008»
15 years 1 months ago
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
The stream cipher Salsa20 was introduced by Bernstein in 2005 as a candidate in the eSTREAM project, accompanied by the reduced versions Salsa20/8 and Salsa20/12. ChaCha is a varia...
Jean-Philippe Aumasson, Simon Fischer 0002, Shahra...