Sciweavers

2949 search results - page 166 / 590
» Transformations in Information Supply
Sort
View
CVPR
2005
IEEE
14 years 11 months ago
Isophote Properties as Features for Object Detection
Usually, object detection is performed directly on (normalized) gray values or gray primitives like gradients or Haar-like features. In that case the learning of relationships bet...
Jeroen Lichtenauer, Emile A. Hendriks, Marcel J. T...
WWW
2007
ACM
14 years 10 months ago
Building and managing personalized semantic portals
This paper presents a semantic portal, SEMPort, which provides better user support with personalized views, semantic navigation, ontology-based search and three different kinds of...
Melike Sah, Wendy Hall
ATAL
2009
Springer
14 years 3 months ago
An agent-based commodity trading simulation
In this paper, an event-centric commodity trading simulation powered by the multiagent framework is presented. The purpose of this simulation platform is for training novice trade...
Shih-Fen Cheng, Yee Pin Lim, Chao-Chih Liu
FDTC
2009
Springer
104views Cryptology» more  FDTC 2009»
14 years 3 months ago
Low Voltage Fault Attacks on the RSA Cryptosystem
—Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptograph...
Alessandro Barenghi, Guido Bertoni, Emanuele Parri...
MDAI
2009
Springer
14 years 3 months ago
The Functionality-Security-Privacy Game
Privacy preservation in the information society is in many respects parallel to environment preservation in the physical world. In this way, “green ICT services” are those achi...
Josep Domingo-Ferrer