Sciweavers

272 search results - page 28 / 55
» Differential categories
Sort
View
ICPR
2004
IEEE
14 years 8 months ago
Object Recognition Using Composed Receptive Field Histograms of Higher Dimensionality
Recent work has shown that effective methods for recognising objects or spatio-temporal events can be constructed based on receptive field responses summarised into histograms or ...
Oskar Linde, Tony Lindeberg
DAC
2005
ACM
14 years 8 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
ICSE
2008
IEEE-ACM
14 years 8 months ago
Temporal dependency based checkpoint selection for dynamic verification of fixed-time constraints in grid workflow systems
In grid workflow systems, temporal correctness is critical to assure the timely completion of grid workflow execution. To monitor and control the temporal correctness, fixed-time ...
Jinjun Chen, Yun Yang
WWW
2008
ACM
14 years 8 months ago
Rogue access point detection using segmental TCP jitter
Rogue Access Points (RAPs) pose serious security threats to local networks. An analytic model of prior probability distribution of Segmental TCP Jitter (STJ) is deduced from the m...
Gaogang Xie, Tingting He, Guangxing Zhang
KDD
2003
ACM
129views Data Mining» more  KDD 2003»
14 years 8 months ago
Nantonac collaborative filtering: recommendation based on order responses
A recommender system suggests the items expected to be preferred by the users. Recommender systems use collaborative filtering to recommend items by summarizing the preferences of...
Toshihiro Kamishima