Sciweavers

22 search results - page 3 / 5
» Detecting Features from Confusion Matrices Using Generalized...
Sort
View
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
12 years 2 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
GI
2009
Springer
13 years 4 months ago
A Modular Framework to Detect and Analyze Faces for Audience Measurement Systems
: In this paper we describe an approach that enables the detection, tracking and fine analysis (classification of gender and facial expression) of faces using a single web camera. ...
Christian Küblbeck, Tobias Ruf, Andreas Ernst
WWW
2006
ACM
14 years 7 months ago
Logical structure based semantic relationship extraction from semi-structured documents
Addressed in this paper is the issue of semantic relationship extraction from semi-structured documents. Many research efforts have been made so far on the semantic information ex...
Kuo Zhang, Gang Wu, Juan-Zi Li
CIVR
2008
Springer
207views Image Analysis» more  CIVR 2008»
13 years 9 months ago
Accumulated motion energy fields estimation and representation for semantic event detection
In this paper, a motion-based approach for detecting highlevel semantic events in video sequences is presented. Its main characteristic is its generic nature, i.e. it can be direc...
Georgios Th. Papadopoulos, Vasileios Mezaris, Ioan...
CHES
2009
Springer
157views Cryptology» more  CHES 2009»
14 years 7 months ago
Differential Cluster Analysis
Abstract. We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions ...
Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Ru...