Sciweavers

1941 search results - page 327 / 389
» The representation of planning strategies
Sort
View
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 4 months ago
A Very Compact "Perfectly Masked" S-Box for AES
Implementations of the Advanced Encryption Standard (AES), including hardware applications with limited resources (e.g., smart cards), may be vulnerable to ā€œside-channel attacksā...
D. Canright, Lejla Batina
ICMCS
2007
IEEE
192views Multimedia» more  ICMCS 2007»
14 years 4 months ago
Effective Extraction of Gabor Features for Adaptive Mammogram Retrieval
Breast cancer is one of the most common diseases among women. Content-based mammogram retrieval has been proposed to aid various medical procedures. To develop a content-based mam...
Chia-Hung Wei, Yue Li, Chang-Tsun Li
IJCNN
2007
IEEE
14 years 4 months ago
An Associative Memory for Association Rule Mining
ā€” Association Rule Mining is a thoroughly studied problem in Data Mining. Its solution has been aimed for by approaches based on different strategies involving, for instance, the...
Vicente O. Baez-Monroy, Simon O'Keefe
AUSDM
2007
Springer
113views Data Mining» more  AUSDM 2007»
14 years 4 months ago
PCITMiner- Prefix-based Closed Induced Tree Miner for finding closed induced frequent subtrees
Frequent subtree mining has attracted a great deal of interest among the researchers due to its application in a wide variety of domains. Some of the domains include bio informati...
Sangeetha Kutty, Richi Nayak, Yuefeng Li
CAV
2007
Springer
121views Hardware» more  CAV 2007»
14 years 4 months ago
Algorithms for Interface Synthesis
Abstract. A temporal interface for a software component is a ļ¬nite automaton that speciļ¬es the legal sequences of calls to functions that are provided by the component. We comp...
Dirk Beyer, Thomas A. Henzinger, Vasu Singh