Sciweavers

516 search results - page 73 / 104
» Comparing Two Information Flow Security Properties
Sort
View
CVIU
2007
157views more  CVIU 2007»
13 years 9 months ago
Camera calibration and light source orientation from solar shadows
In this paper, we describe a method for recovering camera parameters from perspective views of daylight shadows in a scene, given only minimal geometric information determined fro...
Xiaochun Cao, Hassan Foroosh
ML
2012
ACM
388views Machine Learning» more  ML 2012»
12 years 4 months ago
Statistical analysis of kernel-based least-squares density-ratio estimation
The ratio of two probability densities can be used for solving various machine learning tasks such as covariate shift adaptation (importance sampling), outlier detection (likeliho...
Takafumi Kanamori, Taiji Suzuki, Masashi Sugiyama
EUROCRYPT
2009
Springer
14 years 9 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
JCP
2008
119views more  JCP 2008»
13 years 9 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
SAFECOMP
2007
Springer
14 years 3 months ago
A Comparison of Partitioning Operating Systems for Integrated Systems
In present-day electronic systems, application subsystems from different vendors and with different criticality levels are integrated within the same hardware. Hence, encapsulati...
Bernhard Leiner, Martin Schlager, Roman Obermaisse...