Sciweavers

1328 search results - page 211 / 266
» Stacked Generalization for Information Extraction
Sort
View
DAC
2007
ACM
13 years 11 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
ACSAC
2004
IEEE
13 years 11 months ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...
AVSS
2006
IEEE
13 years 11 months ago
Classification-Based Likelihood Functions for Bayesian Tracking
The success of any Bayesian particle filtering based tracker relies heavily on the ability of the likelihood function to discriminate between the state that fits the image well an...
Chunhua Shen, Hongdong Li, Michael J. Brooks
DASFAA
2004
IEEE
76views Database» more  DASFAA 2004»
13 years 11 months ago
XTree for Declarative XML Querying
Abstract. How to query XML documents to extract and restructure the information is an important issue in XML research. Currently, XQuery based on XPath is the most promising standa...
Zhuo Chen, Tok Wang Ling, Mengchi Liu, Gillian Dob...
AIPR
2003
IEEE
13 years 11 months ago
Sensor and Classifier Fusion for Outdoor Obstacle Detection: an Application of Data Fusion To Autonomous Off-Road Navigation
This paper describes an approach for using several levels of data fusion in the domain of autonomous off-road navigation. We are focusing on outdoor obstacle detection, and we pre...
Cristian Dima, Nicolas Vandapel, Martial Hebert