Sciweavers

3116 search results - page 101 / 624
» Recovering
Sort
View
VISUALIZATION
2002
IEEE
14 years 2 months ago
Oriented Tensor Reconstruction: Tracing Neural Pathways from Diffusion Tensor MRI
In this paper we develop a new technique for tracing anatomical fibers from 3D tensor fields. The technique extracts salient tensor features using a local regularization techniq...
Leonid Zhukov, Alan H. Barr
WCRE
2002
IEEE
14 years 2 months ago
Analysis of Virtual Method Invocation for Binary Translation
The University of Queensland Binary Translator (UQBT ) is a static binary translation framework that allows for the translation of binary, executable programs, from one architectu...
Jens Tröger, Cristina Cifuentes
ASIACRYPT
2009
Springer
14 years 1 months ago
PSS Is Secure against Random Fault Attacks
A fault attack consists in inducing hardware malfunctions in order to recover secrets from electronic devices. One of the most famous fault attack is Bellcore’s attack against RS...
Jean-Sébastien Coron, Avradip Mandal
CCS
2001
ACM
14 years 1 months ago
A Cryptanalysis of the High-Bandwidth Digital Content Protection System
Abstract. We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCP is a proposed identity-based cryptosystem ...
Scott Crosby, Ian Goldberg, Robert Johnson, Dawn X...
FGR
2000
IEEE
158views Biometrics» more  FGR 2000»
14 years 1 months ago
Dual-State Parametric Eye Tracking
Most eye trackers work well for open eyes. However, blinking is a physiological necessity for humans. Moreover, for applicationssuch as facial expression analysis and driver aware...
Ying-li Tian, Takeo Kanade, Jeffrey F. Cohn