Sciweavers

143 search results - page 26 / 29
» Sampling Strategies to Evaluate the Performance of Unknown P...
Sort
View
IJON
2010
129views more  IJON 2010»
13 years 6 months ago
Robust object tracking using a spatial pyramid heat kernel structural information representation
In this paper, we propose an object tracking framework based on a spatial pyramid heat kernel structural information representation. In the tracking framework, we take advantage o...
Xi Li, Weiming Hu, Hanzi Wang, Zhongfei Zhang
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
12 years 7 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert
BMCBI
2011
12 years 11 months ago
Robust joint analysis allowing for model uncertainty in two-stage genetic association studies
Background: The cost efficient two-stage design is often used in genome-wide association studies (GWASs) in searching for genetic loci underlying the susceptibility for complex di...
Dongdong Pan, Qizhai Li, Ningning Jiang, Aiyi Liu,...
ACSAC
2010
IEEE
13 years 5 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
TMM
2010
231views Management» more  TMM 2010»
13 years 2 months ago
Real-Time Visual Concept Classification
As datasets grow increasingly large in content-based image and video retrieval, computational efficiency of concept classification is important. This paper reviews techniques to ac...
Jasper R. R. Uijlings, Arnold W. M. Smeulders, Rem...