Sciweavers

3086 search results - page 572 / 618
» Generalized Discriminant Analysis Using a Kernel Approach
Sort
View
CCS
2008
ACM
13 years 9 months ago
Verifiable functional purity in java
Proving that particular methods within a code base are functionally pure--deterministic and side-effect free--would aid verification of security properties including function inve...
Matthew Finifter, Adrian Mettler, Naveen Sastry, D...
TRECVID
2007
13 years 8 months ago
The MediaMill TRECVID 2007 Semantic Video Search Engine
In this paper we describe our TRECVID 2007 experiments. The MediaMill team participated in two tasks: concept detection and search. For concept detection we extract regionbased im...
Cees G. M. Snoek, I. Everts, Jan van Gemert, Jan-M...
CHES
2010
Springer
187views Cryptology» more  CHES 2010»
13 years 8 months ago
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain...
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...
CLEF
2009
Springer
13 years 8 months ago
Where in the Wikipedia Is That Answer? The XLDB at the GikiCLEF 2009 Task
GikiCLEF focused on the evaluation of the reasoning capabilities of systems to provide right answers for geographically-challenging topics. As we did not have previous experience ...
Nuno Cardoso, David Batista, Francisco J. Ló...
BMCBI
2002
214views more  BMCBI 2002»
13 years 7 months ago
Automated modelling of signal transduction networks
Background: Intracellular signal transduction is achieved by networks of proteins and small molecules that transmit information from the cell surface to the nucleus, where they ul...
Martin Steffen, Allegra Petti, John Aach, Patrik D...