Sciweavers

667 search results - page 50 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
111
Voted
SMI
2003
IEEE
131views Image Analysis» more  SMI 2003»
15 years 7 months ago
Watermarking 2D Vector Maps in the Mesh-Spectral Domain
This paper proposes a digital watermarking algorithm for 2D vector digital maps. The watermark is a robust, informed-detection watermark to be used to prevent such abuses as an in...
Ryutarou Ohbuchi, Hiroo Ueda, Shuh Endoh
CHES
2001
Springer
193views Cryptology» more  CHES 2001»
15 years 7 months ago
Preventing SPA/DPA in ECC Systems Using the Jacobi Form
Abstract. In this paper we show how using a representation of an elliptic curve as the intersection of two quadrics in P3 can provide a defence against Simple and Differental Powe...
Pierre-Yvan Liardet, Nigel P. Smart
123
Voted
RTAS
2003
IEEE
15 years 7 months ago
Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network
This paper presents a novel approach for calculating a probabilistic worst-case response-time for messages in the Controller Area Network (CAN). CAN uses a bit-stuffing mechanism...
Thomas Nolte, Hans Hansson, Christer Norström
99
Voted
IJCNLP
2005
Springer
15 years 8 months ago
A Lexicon-Constrained Character Model for Chinese Morphological Analysis
Abstract. This paper proposes a lexicon-constrained character model that combines both word and character features to solve complicated issues in Chinese morphological analysis. A ...
Yao Meng, Hao Yu, Fumihito Nishino
BMCBI
2010
164views more  BMCBI 2010»
15 years 3 hour ago
Merged consensus clustering to assess and improve class discovery with microarray data
Background: One of the most commonly performed tasks when analysing high throughput gene expression data is to use clustering methods to classify the data into groups. There are a...
T. Ian Simpson, J. Douglas Armstrong, Andrew P. Ja...