Sciweavers

2656 search results - page 442 / 532
» Design and analysis of algorithms reconsidered
Sort
View
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
13 years 10 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
MM
2010
ACM
208views Multimedia» more  MM 2010»
13 years 9 months ago
A new approach to cross-modal multimedia retrieval
The problem of joint modeling the text and image components of multimedia documents is studied. The text component is represented as a sample from a hidden topic model, learned wi...
Nikhil Rasiwasia, Jose Costa Pereira, Emanuele Cov...
AUTOMATICA
2008
134views more  AUTOMATICA 2008»
13 years 9 months ago
Probabilistic reachability and safety for controlled discrete time stochastic hybrid systems
In this work, probabilistic reachability over a finite horizon is investigated for a class of discrete time stochastic hybrid systems with control inputs. A suitable embedding of ...
Alessandro Abate, Maria Prandini, John Lygeros, Sh...
CORR
2008
Springer
175views Education» more  CORR 2008»
13 years 9 months ago
Energy Aware Self-Organizing Density Management in Wireless Sensor Networks
Energy consumption is the most important factor that determines sensor node lifetime. The optimization of wireless sensor network lifetime targets not only the reduction of energy...
Erwan Le Merrer, Vincent Gramoli, Anne-Marie Kerma...
JCIT
2008
172views more  JCIT 2008»
13 years 8 months ago
Rough Wavelet Hybrid Image Classification Scheme
This paper introduces a new computer-aided classification system for detection of prostate cancer in Transrectal Ultrasound images (TRUS). To increase the efficiency of the comput...
Hala S. Own, Aboul Ella Hassanien