Sciweavers

2270 search results - page 324 / 454
» The Quality of Knowledge: Knowledge Patterns and Knowledge R...
Sort
View
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
14 years 1 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
DAGM
2006
Springer
14 years 1 months ago
Nonparametric Density Estimation for Human Pose Tracking
The present paper considers the supplement of prior knowledge about joint angle configurations in the scope of 3-D human pose tracking. Training samples obtained from an industrial...
Thomas Brox, Bodo Rosenhahn, Uwe G. Kersting, Dani...
DAGM
2006
Springer
14 years 1 months ago
Optimizing Spectral Filters for Single Trial EEG Classification
We propose a novel spectral filter optimization algorithm for the single trial ElectroEncephaloGraphy (EEG) classification problem. The algorithm is designed to improve the classif...
Ryota Tomioka, Guido Dornhege, Guido Nolte, Kazuyu...
DAWAK
2006
Springer
14 years 1 months ago
Efficient Mining of Dissociation Rules
Abstract. Association rule mining is one of the most popular data mining techniques. Significant work has been done to extend the basic association rule framework to allow for mini...
Mikolaj Morzy
ETRICS
2006
14 years 1 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...