Sciweavers

524 search results - page 78 / 105
» Why phishing works
Sort
View
VTC
2010
IEEE
113views Communications» more  VTC 2010»
14 years 10 months ago
Design of Fixed-Point Processing Based Turbo Codes Using Extrinsic Information Transfer Charts
—The operand-width specifications in fixed-point hardware implementations of turbo code decoders is an important design issue, since this governs the trade-off between the deco...
Liang Li, Robert G. Maunder, Bashir M. Al-Hashimi,...
DRR
2009
14 years 9 months ago
Using synthetic data safely in classification
When is it safe to use synthetic data in supervised classification? Trainable classifier technologies require large representative training sets consisting of samples labeled with...
Jean Nonnemaker, Henry Baird
ENTCS
2010
118views more  ENTCS 2010»
14 years 9 months ago
Fragments-based Model Reduction: Some Case Studies
Molecular biological models usually suffer from a dramatic combinatorial blow up. Indeed, proteins form complexes and can modify each others, which leads to the formation of a hug...
Jérôme Feret
JCS
2011
87views more  JCS 2011»
14 years 6 months ago
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
Gerhard P. Hancke
PAMI
2011
14 years 6 months ago
Revisiting Linear Discriminant Techniques in Gender Recognition
—Emerging applications of computer vision and pattern recognition in mobile devices and networked computing require the development of resourcelimited algorithms. Linear classifi...
Juan Bekios-Calfa, José Miguel Buenaposada,...