Sciweavers

4050 search results - page 593 / 810
» Information Extraction from Voicemail
Sort
View
DATE
2006
IEEE
95views Hardware» more  DATE 2006»
14 years 1 months ago
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
- Many electronic systems contain implementations of cryptographic algorithms in order to provide security. It is well known that cryptographic algorithms, irrespective of their th...
Nachiketh R. Potlapally, Anand Raghunathan, Srivat...
CVPR
2009
IEEE
15 years 5 months ago
Learning sign language by watching TV (using weakly aligned subtitles)
The goal of this work is to automatically learn a large number of British Sign Language (BSL) signs from TV broadcasts. We achieve this by using the supervisory information avai...
Patrick Buehler (University of Oxford), Mark Everi...
ICIP
2001
IEEE
14 years 11 months ago
On the estimation of spectral data: a genetic algorithm approach
Spectral data estimation from image data is an ill-posed problem since (i) due to the integral nature of solid-state light sensors the same output can be obtained from an infinity...
Amâncio Santos, António Dourado, Bern...
ICIP
2000
IEEE
14 years 10 months ago
Combined Dynamic Tracking and Recognition of Curves with Application to Road Detection
We present an algorithm that extracts the largest shape within a specificclass, starting from a set of image edgels. The algorithm inherits the Best-First Segmentation approach [jp...
Frederic Guichard, Jean-Philippe Tarel
ESORICS
2009
Springer
14 years 10 months ago
Automatically Generating Models for Botnet Detection
A botnet is a network of compromised hosts that is under the control of a single, malicious entity, often called the botmaster. We present a system that aims to detect bots, indepe...
Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan G...