Sciweavers

686 search results - page 134 / 138
» Inexact pattern matching using genetic algorithm
Sort
View
ERSHOV
1989
Springer
13 years 11 months ago
Experiments with Implementations of Two Theoretical Constructions
This paper reports two experiments with implementations of constructions from theoretical computer science. The first one deals with Kleene’s and Rogers’ second recursion the...
Torben Amtoft Hansen, Thomas Nikolajsen, Jesper La...
WISA
2009
Springer
14 years 2 months ago
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation
Power analysis has shown to be successful in breaking symmetric cryptographic algorithms implemented on low resource devices. Prompted by the breaking of many protected implementat...
J. Pan, J. I. den Hartog, Jiqiang Lu
SIGIR
2005
ACM
14 years 1 months ago
Impedance coupling in content-targeted advertising
The current boom of the Web is associated with the revenues originated from on-line advertising. While search-based advertising is dominant, the association of ads with a Web page...
Berthier A. Ribeiro-Neto, Marco Cristo, Paulo Braz...
JUCS
2002
163views more  JUCS 2002»
13 years 7 months ago
Finding Plagiarisms among a Set of Programs with JPlag
: JPlag is a web service that finds pairs of similar programs among a given set of programs. It has successfully been used in practice for detecting plagiarisms among student Java ...
Lutz Prechelt, Guido Malpohl, Michael Philippsen
PR
2008
159views more  PR 2008»
13 years 7 months ago
A two-stage head pose estimation framework and evaluation
Head pose is an important indicator of a person's focus of attention. Also, head pose estimation can be used as the front-end analysis for multi-view face analysis. For examp...
Junwen Wu, Mohan M. Trivedi