Sciweavers

2084 search results - page 384 / 417
» Knowledge Exploitation from the Web
Sort
View
ICIP
2008
IEEE
14 years 11 months ago
Spect image restoration via Recursive Inverse Filtering constrained by a probabilistic MRI atlas
3D Brain SPECT imagery is a well established functional imaging method which has become a great help to physicians in the diagnosis of several neurological and cerebrovascular dis...
Said Benameur, Max Mignotte, Jean-Paul Soucy, Jean...
WEA
2010
Springer
289views Algorithms» more  WEA 2010»
14 years 4 months ago
Experiments with a Generic Dantzig-Wolfe Decomposition for Integer Programs
Abstract We report on experiments with turning the branch-price-andcut framework SCIP into a generic branch-price-and-cut solver. That is, given a mixed integer program (MIP), our ...
Gerald Gamrath, Marco E. Lübbecke
AFRICACRYPT
2009
Springer
14 years 3 months ago
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the efforts required for a complete break of remote keyless...
Markus Kasper, Timo Kasper, Amir Moradi, Christof ...
DIM
2006
ACM
14 years 3 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
ECCB
2005
IEEE
14 years 2 months ago
A query language for biological networks
Many areas of modern biology are concerned with the management, storage, visualization, comparison, and analysis of networks. For instance, networks are used to model signal trans...
Ulf Leser