Sciweavers

2351 search results - page 192 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
TMI
2010
175views more  TMI 2010»
14 years 11 months ago
Spatially Adaptive Mixture Modeling for Analysis of fMRI Time Series
Within-subject analysis in fMRI essentially addresses two problems, the detection of brain regions eliciting evoked activity and the estimation of the underlying dynamics. In [1, 2...
Thomas Vincent, Laurent Risser, Philippe Ciuciu
VCBM
2010
14 years 11 months ago
Visual Analysis of Integrated Resting State Functional Brain Connectivity and Anatomy
Resting state functional magnetic resonance imaging (rs-fMRI) is an important modality in the study of the functional architecture of the human brain. The correlation between the ...
Andre F. van Dixhoorn, Bastijn H. Vissers, Luca Fe...
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
13 years 7 months ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...
ESORICS
2009
Springer
15 years 11 months ago
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem
Abstract. Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy...
Ileana Buhan, Jeroen Breebaart, Jorge Guajardo, Ko...
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
15 years 10 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel