Sciweavers

1257 search results - page 206 / 252
» Performance of Biometric Quality Measures
Sort
View
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
13 years 11 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
ERCIMDL
2007
Springer
114views Education» more  ERCIMDL 2007»
13 years 11 months ago
Key Element-Context Model: An Approach to Efficient Web Metadata Maintenance
In this paper, we study the problem of maintaining metadata for open Web content. In digital libraries such as DLESE, NSDL and G-Portal, metadata records are created for some good ...
Ba-Quy Vuong, Ee-Peng Lim, Aixin Sun, Chew-Hung Ch...
CP
2006
Springer
13 years 11 months ago
Failure Analysis in Backtrack Search for Constraint Satisfaction
Abstract. Researchers have focused on assessing the quality of search algorithms by measuring effort, number of mistakes, runtime distributions and other characteristics. In this p...
Tudor Hulubei, Barry O'Sullivan
EMSOFT
2006
Springer
13 years 11 months ago
Energy adaptation for multimedia information kiosks
Video kiosks increasingly contain powerful PC-like embedded processors, allowing them to display video at a high level of quality. Such video display, however, entails significant...
Richard Urunuela, Gilles Muller, Julia L. Lawall
MICCAI
2000
Springer
13 years 11 months ago
Pre- and Intra-operative Planning and Simulation of Percutaneous Tumor Ablation
We developed a software tool for pre-operative simulation and planning, and intra-operative guidance, of minimally invasive tumor ablation, including radiofrequency-, laser- and cr...
Torsten Butz, Simon K. Warfield, Kemal Tuncali, St...