Sciweavers

15351 search results - page 2838 / 3071
» The information bottleneck method
Sort
View
137
Voted
JCS
2010
135views more  JCS 2010»
15 years 2 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
103
Voted
MICCAI
2010
Springer
15 years 2 months ago
Statistical Analysis of Structural Brain Connectivity
Abstract. We present a framework for statistical analysis in large cohorts of structural brain connectivity, derived from diffusion weighted MRI. A brain network is defined betwe...
Renske de Boer, Michiel Schaap, Fedde van der Lijn...
128
Voted
ASIACRYPT
2010
Springer
15 years 1 months ago
The World Is Not Enough: Another Look on Second-Order DPA
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysi...
François-Xavier Standaert, Nicolas Veyrat-C...
CASCON
2010
174views Education» more  CASCON 2010»
15 years 1 months ago
Smart Services Across the Real and Virtual Worlds
Today, we are witnessing a new level of scale, complexity, and pervasiveness of software systems that are designed to support much more holistically complex processes. Much richer...
Eleni Stroulia
172
Voted
CIVR
2010
Springer
246views Image Analysis» more  CIVR 2010»
15 years 1 months ago
Genre-specific semantic video indexing
In many applications, we find large video collections from different genres where the user is often only interested in one or two specific video genres. So, when users are queryin...
Jun Wu, Marcel Worring
« Prev « First page 2838 / 3071 Last » Next »