Sciweavers

4306 search results - page 434 / 862
» Timed Testing with TorX
Sort
View
DAC
2007
ACM
15 years 7 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
ESEM
2007
ACM
15 years 7 months ago
An Empirical Study of the Effects of Gestalt Principles on Diagram Understandability
Comprehension errors in software design must be detected at their origin to avoid propagation into later portions of the software lifecycle and also the final system. This researc...
Krystle Lemon, Edward B. Allen, Jeffrey C. Carver,...
128
Voted
FIMH
2007
Springer
15 years 7 months ago
Constrained Reconstruction of Sparse Cardiac MR DTI Data
Magnetic resonance diffusion tensor imaging (DTI) has emerged as a convenient and reliable alternative to conventional histology for characterizing the fiber structure of the myoca...
Ganesh Adluru, Edward Hsu, Edward V. R. Di Bella
104
Voted
CVPR
2009
IEEE
15 years 7 months ago
Keypoint induced distance profiles for visual recognition
We show that histograms of keypoint descriptor distances can make useful features for visual recognition. Descriptor distances are often exhaustively computed between sets of keyp...
Tat-Jun Chin, David Suter
HRI
2007
ACM
15 years 7 months ago
Comparing a computer agent with a humanoid robot
HRI researchers interested in social robots have made large investments in humanoid robots. There is still sparse evidence that peoples' responses to robots differ from their...
Aaron Powers, Sara B. Kiesler, Susan R. Fussell, C...