Sciweavers

543 search results - page 93 / 109
» Argumentation Using Temporal Knowledge
Sort
View
EDCC
2008
Springer
13 years 9 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
NIPS
2007
13 years 9 months ago
Spatial Latent Dirichlet Allocation
In recent years, the language model Latent Dirichlet Allocation (LDA), which clusters co-occurring words into topics, has been widely applied in the computer vision field. Howeve...
Xiaogang Wang, Eric Grimson
MVA
2006
205views Computer Vision» more  MVA 2006»
13 years 7 months ago
Ontological inference for image and video analysis
Abstract This paper presents an approach to designing and implementing extensible computational models for perceiving systems based on a knowledge-driven joint inference approach. ...
Christopher Town
TOG
2008
104views more  TOG 2008»
13 years 7 months ago
Streaming multigrid for gradient-domain operations on large images
We introduce a new tool to solve the large linear systems arising from gradient-domain image processing. Specifically, we develop a streaming multigrid solver, which needs just tw...
Michael M. Kazhdan, Hugues Hoppe
TNN
1998
111views more  TNN 1998»
13 years 7 months ago
Modular recurrent neural networks for Mandarin syllable recognition
Abstract—A new modular recurrent neural network (MRNN)based speech-recognition method that can recognize the entire vocabulary of 1280 highly confusable Mandarin syllables is pro...
Sin-Horng Chen, Yuan-Fu Liao