Sciweavers

89463 search results - page 68 / 17893
» From
Sort
View
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
14 years 1 months ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir
ICMCS
1999
IEEE
134views Multimedia» more  ICMCS 1999»
14 years 1 months ago
Counting People from Multiple Cameras
We are interested in the content analysis of video from a collection of spatially distant cameras viewing a single environment. We address the task of counting the number of diffe...
Vera Kettnaker, Ramin Zabih
ICIAP
1999
ACM
14 years 1 months ago
Creation of Real Images which are Valid for the Assumptions Made in Shape from Shading
Iterative methods showed until now encouraging results to resolve shape from shading. This kind of methods generally work on synthetic images, and occasionally on real images, eve...
Pascal Daniel, Jean-Denis Durou
CIKM
1998
Springer
14 years 29 days ago
Ontology-Based Extraction and Structuring of Information from Data-Rich Unstructured Documents
We present a new approach to extracting information from unstructured documents based on an application ontology that describes a domain of interest. Starting with such an ontolog...
David W. Embley, Douglas M. Campbell, Randy D. Smi...
DL
1998
Springer
110views Digital Library» more  DL 1998»
14 years 29 days ago
Failure Analysis in Query Construction: Data and Analysis from a Large Sample of Web Queries
This paper reports results from a failure analysis (i.e., incorrect query construction) of 51,473 queries from 18,113 users of Excite, a major Web search engine. Given that many d...
Bernard J. Jansen, Amanda Spink, Tefko Saracevic