Sciweavers

17505 search results - page 3395 / 3501
» Use Cases as Workflows
Sort
View
CBMS
2004
IEEE
15 years 8 months ago
Real-Time Matching of Angiographies with In Situ Heart Image Sequences
Coronary angiography has become an important tool in modern medicine by providing an additional modality for heart disease diagnostics. Even though the recorded images (or image s...
Istvan Nagy, Alois Knoll, Robert Bauernschmitt, Ev...
CHES
2004
Springer
216views Cryptology» more  CHES 2004»
15 years 8 months ago
Efficient Countermeasures against RPA, DPA, and SPA
In the execution on a smart card, side channel attacks such as simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat [15]. Side channel a...
Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto
ASIACRYPT
2006
Springer
15 years 8 months ago
Secure Sketch for Biometric Templates
There have been active discussions on how to derive a consistent cryptographic key from noisy data such as biometric templates, with the help of some extra information called a ske...
Qiming Li, Yagiz Sutcu, Nasir D. Memon
ATAL
2006
Springer
15 years 8 months ago
Accident or intention: that is the question (in the Noisy Iterated Prisoner's Dilemma)
This paper focuses on the Noisy Iterated Prisoner's Dilemma, a version of the Iterated Prisoner's Dilemma (IPD) in which there is a nonzero probability that a "coop...
Tsz-Chiu Au, Dana S. Nau
ATAL
2006
Springer
15 years 8 months ago
Evolutionary Stability of Behavioural Types in the Continuous Double Auction
In this paper, we investigate the effectiveness of different types of bidding behaviour for trading agents in the Continuous Double Auction (CDA). Specifically, we consider behavi...
Perukrishnen Vytelingum, Dave Cliff, Nicholas R. J...
« Prev « First page 3395 / 3501 Last » Next »