Sciweavers

10891 search results - page 83 / 2179
» Combining Model Reductions
Sort
View
106
Voted
TRUST
2010
Springer
15 years 7 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
108
Voted
FSKD
2006
Springer
124views Fuzzy Logic» more  FSKD 2006»
15 years 6 months ago
An Effective Combination of Multiple Classifiers for Toxicity Prediction
This paper presents an investigation into the combination of different classifiers for toxicity prediction. These classification methods involved in generating classifiers for comb...
Gongde Guo, Daniel Neagu, Xuming Huang, Yaxin Bi
ICPR
2010
IEEE
15 years 4 months ago
Consensus Network Based Hypotheses Combination for Arabic Offline Handwriting Recognition
Offline handwriting recognition (OHR) is an extremely challenging task because of many factors including variations in writing style, writing device and material, and noise in the ...
Rohit Prasad, Matin Kamali, David Belanger, Antti-...
121
Voted
CONEXT
2010
ACM
15 years 19 days ago
MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking
Evaluating anomaly detectors is a crucial task in traffic monitoring made particularly difficult due to the lack of ground truth. The goal of the present article is to assist rese...
Romain Fontugne, Pierre Borgnat, Patrice Abry, Ken...
DATE
2007
IEEE
80views Hardware» more  DATE 2007»
15 years 9 months ago
Microarchitecture floorplanning for sub-threshold leakage reduction
Lateral heat conduction between modules affects the temperature profile of a floorplan, affecting the leakage power of individual blocks which increasingly is becoming a larger ...
Hushrav Mogal, Kia Bazargan