Sciweavers

680 search results - page 117 / 136
» A randomized embedding algorithm for trees
Sort
View
EDCC
2008
Springer
13 years 10 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
CORR
2010
Springer
123views Education» more  CORR 2010»
13 years 7 months ago
Feature Construction for Relational Sequence Learning
Abstract. We tackle the problem of multi-class relational sequence learning using relevant patterns discovered from a set of labelled sequences. To deal with this problem, firstly...
Nicola Di Mauro, Teresa Maria Altomare Basile, Ste...
TCOS
2010
13 years 7 months ago
Constructing Two-Dimensional Voronoi Diagrams via Divide-and-Conquer of Envelopes in Space
We present a general framework for computing two-dimensional Voronoi diagrams of different classes of sites under various distance functions. Most diagrams mentioned in the paper ...
Ophir Setter, Micha Sharir, Dan Halperin
FGR
2011
IEEE
288views Biometrics» more  FGR 2011»
13 years 14 days ago
Hierarchical CRF with product label spaces for parts-based models
— Non-rigid object detection is a challenging open research problem in computer vision. It is a critical part in many applications such as image search, surveillance, humancomput...
Gemma Roig, Xavier Boix Bosch, Fernando De la Torr...
DASFAA
2007
IEEE
199views Database» more  DASFAA 2007»
14 years 3 months ago
Detection and Visualization of Subspace Cluster Hierarchies
Subspace clustering (also called projected clustering) addresses the problem that different sets of attributes may be relevant for different clusters in high dimensional feature sp...
Elke Achtert, Christian Böhm, Hans-Peter Krie...