Sciweavers

2236 search results - page 394 / 448
» Intrusion detection techniques and approaches
Sort
View
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
14 years 2 months ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...
CIKM
2004
Springer
14 years 2 months ago
Discovering frequently changing structures from historical structural deltas of unordered XML
Recently, a large amount of work has been done in XML data mining. However, we observed that most of the existing works focus on the snapshot XML data, while XML data is dynamic i...
Qiankun Zhao, Sourav S. Bhowmick, Mukesh K. Mohani...
ISI
2004
Springer
14 years 2 months ago
Spatial Forecast Methods for Terrorist Events in Urban Environments
Abstract. Terrorist events such as suicide bombings are rare yet extremely destructive events. Responses to such events are even rarer, because they require forecasting methods for...
Donald Brown, Jason Dalton, Heidi Hoyle
VISUALIZATION
2002
IEEE
14 years 2 months ago
Exploring Scalar Fields Using Critical Isovalues
Isosurfaces are commonly used to visualize scalar fields. Critical isovalues indicate isosurface topology changes: the creation of new surface components, merging of surface comp...
Gunther H. Weber, Gerik Scheuermann, Hans Hagen, B...
CVPR
2000
IEEE
14 years 1 months ago
Step towards Sequence-to-Sequence Alignment
This paper presents an approach for establishing correspondencesin time and in space between two differentvideo sequences of the same dynamic scene, recorded by stationary uncalib...
Yaron Caspi, Michal Irani