Sciweavers

1400 search results - page 230 / 280
» Post-Analysis of Learned Rules
Sort
View
TNN
1998
121views more  TNN 1998»
15 years 4 months ago
Detection of mines and minelike targets using principal component and neural-network methods
— This paper introduces a new system for real-time detection and classification of arbitrarily scattered surface-laid mines from multispectral imagery data of a minefield. The ...
Xi Miao, Mahmood R. Azimi-Sadjadi, Bin Tan, A. C. ...
IJDAR
2010
110views more  IJDAR 2010»
15 years 3 months ago
Locating and parsing bibliographic references in HTML medical articles
The set of references that typically appear toward the end of journal articles is sometimes, though not always, a field in bibliographic (citation) databases. But even if referenc...
Jie Zou, Daniel X. Le, George R. Thoma
IPL
2010
98views more  IPL 2010»
15 years 3 months ago
Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
In numerous modern stream ciphers, the internal state consists of a large array of pseudo-random words, and the output key-stream is a relatively simple function of the state. In ...
Nathan Keller, Stephen D. Miller
163
Voted
ICDM
2010
IEEE
205views Data Mining» more  ICDM 2010»
15 years 2 months ago
Knowledge File System -- A Principled Approach to Personal Information Management
The Knowledge File System (KFS) is a smart virtual file system that sits between the operating system and the file system. Its primary functionality is to automatically organize fi...
Kuiyu Chang, I. Wayan Tresna Perdana, Bramandia Ra...
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
14 years 4 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas