Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
With the recent efforts made by computer vision researchers,
more and more types of features have been designed
to describe various aspects of visual characteristics.
Modeling s...
Liangliang Cao, Jiebo Luo, Feng Liang, Thomas S. H...
We consider approximate pattern matching in natural language text. We use the words of the text as the alphabet, instead of the characters as in traditional string matching approac...
In this paper, a novel framework for face recognition based on discriminatively trained orthogonal rank-one tensor projections (ORO) and local binary pattern (LBP) is proposed. LB...
Irregular and sparse scientific computing programs frequently experience performance losses due to inefficient use of the memory system in most machines. Previous work has shown t...
Michelle Mills Strout, Nissa Osheim, Dave Rostron,...