Sciweavers

2399 search results - page 347 / 480
» Avatar Information Extraction System
Sort
View
APVIS
2009
15 years 2 months ago
Contextual picking of volumetric structures
This paper presents a novel method for the interactive identification of contextual interest points within volumetric data by picking on a direct volume rendered image. In clinica...
Peter Kohlmann, Stefan Bruckner, Armin Kanitsar, M...
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
15 years 2 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
149
Voted
CORIA
2010
14 years 11 months ago
Spatio-Temporal Modeling for Knowledge Discovery in Satellite Image Databases
Knowledge discovery from satellite images in spatio-temporal context remains one of the major challenges in the remote sensing field. It is, always, difficult for a user to manuall...
Wadii Boulila, Imed Riadh Farah, Karim Saheb Ettab...
ECWEB
2004
Springer
179views ECommerce» more  ECWEB 2004»
15 years 10 months ago
Applying Text Mining on Electronic Messages for Competitive Intelligence
This paper presents how text -mining techniques can be used to analyze an enterprise’s external environment searching for competitors, related products and services, marketing st...
José Palazzo Moreira de Oliveira, Stanley L...
SAC
2010
ACM
15 years 4 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit