Sciweavers

9888 search results - page 1889 / 1978
» Active Algorithm Selection
Sort
View
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 8 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
GROUP
2010
ACM
13 years 8 months ago
Enhancing group recommendation by incorporating social relationship interactions
Group recommendation, which makes recommendations to a group of users instead of individuals, has become increasingly important in both the workspace and people's social acti...
Mike Gartrell, Xinyu Xing, Qin Lv, Aaron Beach, Ri...
IMC
2010
ACM
13 years 8 months ago
Internet background radiation revisited
The monitoring of packets destined for reachable, yet unused, Internet addresses has proven to be a useful technique for measuring a variety of specific Internet phenomenon (e.g.,...
Eric Wustrow, Manish Karir, Michael Bailey, Farnam...
EUSFLAT
2009
146views Fuzzy Logic» more  EUSFLAT 2009»
13 years 8 months ago
Opposite Fuzzy Sets with Applications in Image Processing
Diverse forms of the concept of opposition are already existent in philosophy, linguistics, psychology and physics. The interplay between entities and opposite entities is apparent...
Hamid R. Tizhoosh
FCSC
2010
238views more  FCSC 2010»
13 years 7 months ago
Knowledge discovery through directed probabilistic topic models: a survey
Graphical models have become the basic framework for topic based probabilistic modeling. Especially models with latent variables have proved to be effective in capturing hidden str...
Ali Daud, Juanzi Li, Lizhu Zhou, Faqir Muhammad
« Prev « First page 1889 / 1978 Last » Next »