Sciweavers

87 search results - page 6 / 18
» Using Delay to Defend Against Database Extraction
Sort
View
ESWS
2010
Springer
13 years 9 months ago
An Unsupervised Approach for Acquiring Ontologies and RDF Data from Online Life Science Databases
In the Linked Open Data cloud one of the largest data sets, comprising of 2.5 billion triples, is derived from the Life Science domain. Yet this represents a small fraction of the ...
Saqib Mir, Steffen Staab, Isabel Rojas
TASLP
2008
99views more  TASLP 2008»
13 years 7 months ago
Epoch Extraction From Speech Signals
Epoch is the instant of significant excitation of the vocal-tract system during production of speech. For most voiced speech, the most significant excitation takes place around the...
K. S. R. Murty, B. Yegnanarayana
SCIA
2005
Springer
220views Image Analysis» more  SCIA 2005»
14 years 1 months ago
Block-Based Methods for Image Retrieval Using Local Binary Patterns
In this paper, two block-based texture methods are proposed for content-based image retrieval (CBIR). The approaches use the Local Binary Pattern (LBP) texture feature as the sourc...
Valtteri Takala, Timo Ahonen, Matti Pietikäin...
ITCC
2005
IEEE
14 years 1 months ago
A Scalable and High Performance Elliptic Curve Processor with Resistance to Timing Attacks
This paper presents a high performance and scalable elliptic curve processor which is designed to be resistant against timing attacks. The point multiplication algorithm (double-a...
Alireza Hodjat, David Hwang, Ingrid Verbauwhede
IEEEIAS
2007
IEEE
14 years 1 months ago
Protection of Mammograms Using Blind Steganography and Watermarking
As medical image databases are connected together through PACS, those medical images may suffer from security breaches if not protected. If a medical image is illegally obtained o...
Yue Li, Chang-Tsun Li, Chia-Hung Wei