Sciweavers

134 search results - page 15 / 27
» The First Experimental Cryptanalysis of the Data Encryption ...
Sort
View
CODES
2006
IEEE
14 years 1 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
AI
2006
Springer
13 years 11 months ago
Unsupervised Named-Entity Recognition: Generating Gazetteers and Resolving Ambiguity
In this paper, we propose a named-entity recognition (NER) system that addresses two major limitations frequently discussed in the field. First, the system requires no human interv...
David Nadeau, Peter D. Turney, Stan Matwin
INFOCOM
2000
IEEE
13 years 12 months ago
Power Controlled Multiple Access (PCMA) in Wireless Communication Networks
—We address the issue of power-controlled shared channel access in future wireless networks supporting packetized data traffic, beyond the voice-oriented continuous traffic prima...
Nicholas Bambos, Sunil Kandukuri
KDD
2009
ACM
193views Data Mining» more  KDD 2009»
14 years 8 months ago
Probabilistic frequent itemset mining in uncertain databases
Probabilistic frequent itemset mining in uncertain transaction databases semantically and computationally differs from traditional techniques applied to standard "certain&quo...
Andreas Züfle, Florian Verhein, Hans-Peter Kr...
AMFG
2005
IEEE
244views Biometrics» more  AMFG 2005»
14 years 1 months ago
Automatic 3D Facial Expression Analysis in Videos
We introduce a novel framework for automatic 3D facial expression analysis in videos. The preliminary results were demonstrated by editing the facial expression with facial recogni...
Ya Chang, Marcelo Bernardes Vieira, Matthew Turk, ...