Sciweavers

11488 search results - page 2039 / 2298
» Robust optimization - methodology and applications
Sort
View
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
15 years 7 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
141
Voted
ECML
2004
Springer
15 years 7 months ago
Naive Bayesian Classifiers for Ranking
It is well-known that naive Bayes performs surprisingly well in classification, but its probability estimation is poor. In many applications, however, a ranking based on class prob...
Harry Zhang, Jiang Su
CIARP
2006
Springer
15 years 7 months ago
Feature Selection Based on Mutual Correlation
Feature selection is a critical procedure in many pattern recognition applications. There are two distinct mechanisms for feature selection namely the wrapper methods and the filte...
Michal Haindl, Petr Somol, Dimitrios Ververidis, C...
CIKM
2006
Springer
15 years 7 months ago
An integer programming approach for frequent itemset hiding
The rapid growth of transactional data brought, soon enough, into attention the need of its further exploitation. In this paper, we investigate the problem of securing sensitive k...
Aris Gkoulalas-Divanis, Vassilios S. Verykios
FGR
2004
IEEE
159views Biometrics» more  FGR 2004»
15 years 7 months ago
Null Space-based Kernel Fisher Discriminant Analysis for Face Recognition
The null space-based LDA takes full advantage of the null space while the other methods remove the null space. It proves to be optimal in performance. From the theoretical analysi...
Wei Liu, Yunhong Wang, Stan Z. Li, Tieniu Tan
« Prev « First page 2039 / 2298 Last » Next »