Sciweavers

752 search results - page 79 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
146
Voted
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
15 years 1 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
CVPR
2000
IEEE
16 years 5 months ago
Recognizing Upper Face Action Units for Facial Expression Analysis
We develop an automatic system to analyze subtle changes in upper face expressions based on both permanent facial features (brows, eyes, mouth)andtransient facial features (deepen...
Ying-li Tian, Takeo Kanade, Jeffrey F. Cohn
140
Voted
DMIN
2006
122views Data Mining» more  DMIN 2006»
15 years 5 months ago
Cost-Sensitive Analysis in Multiple Time Series Prediction
- In this paper we propose a new methodology for Cost-Benefit analysis in a multiple time series prediction problem. The proposed model is evaluated in a real world application bas...
Chamila Walgampaya, Mehmed M. Kantardzic
134
Voted
ISI
2008
Springer
15 years 3 months ago
A Generative Model for Statistical Determination of Information Content from Conversation Threads
We present a generative model for determining the information content of a message without analyzing the message content. Such a tool is useful for automated analysis of the vast ...
Yingjie Zhou, Malik Magdon-Ismail, William A. Wall...
109
Voted
DATE
2009
IEEE
120views Hardware» more  DATE 2009»
15 years 10 months ago
Overcoming limitations of the SystemC data introspection
—Today verification, testing and debugging of SystemC models can be applied at an early stage in the design process. To support these techniques gaining required information of ...
Christian Genz, Rolf Drechsler