Sciweavers

4050 search results - page 700 / 810
» Information Extraction from Voicemail
Sort
View
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
14 years 2 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
DRM
2005
Springer
14 years 2 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
DRMTICS
2005
Springer
14 years 2 months ago
Algorithms to Watermark Software Through Register Allocation
Software security is a significant issue in the Internet age. In order to prevent software from piracy and unauthorized modification, many techniques have been developed. Softwar...
William Zhu, Clark D. Thomborson
ICANN
2005
Springer
14 years 2 months ago
New Ears for a Robot Cricket
Cricket females perform phonotaxis towards the specific sounds produced by male crickets. By means of a well-tuned peripheral auditory system the cricket is able to extract direct...
Ben Torben-Nielsen, Barbara Webb, Richard E. Reeve
ICIAR
2005
Springer
14 years 2 months ago
Color Indexing by Nonparametric Statistics
A method for color indexing is proposed that is based upon nonparametric statistical techniques. Nonparametrics compare the ordinal rankings of sample populations, and maintain the...
Ian Fraser, Michael A. Greenspan