Sciweavers

1401 search results - page 211 / 281
» Cost-Sensitive Test Strategies
Sort
View
DAC
2007
ACM
14 years 1 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
CVPR
2009
IEEE
14 years 28 days ago
Keypoint induced distance profiles for visual recognition
We show that histograms of keypoint descriptor distances can make useful features for visual recognition. Descriptor distances are often exhaustively computed between sets of keyp...
Tat-Jun Chin, David Suter
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
14 years 28 days ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
GLOBECOM
2007
IEEE
14 years 28 days ago
CAC for Multibeam Opportunistic Schemes in Heterogeneous WiMax Systems Under QoS Constraints
Spatial scheduling in a heterogeneous WiMax Downlink channel, based on partial Channel State Information at the Transmitter (CSIT), is carried out through a multibeam opportunistic...
Nizar Zorba, Ana I. Pérez-Neira
ICIP
2007
IEEE
14 years 28 days ago
Computer-Aided Grading of Neuroblastic Differentiation: Multi-Resolution and Multi-Classifier Approach
In this paper, the development of a computer-aided system for the classification of grade of neuroblastic differentiation is presented. This automated process is carried out withi...
Jun Kong, Olcay Sertel, Hiroyuki Shimada, Kim L. B...