Sciweavers

8135 search results - page 1357 / 1627
» network 2008
Sort
View
ICISC
2008
129views Cryptology» more  ICISC 2008»
15 years 6 months ago
Novel PUF-Based Error Detection Methods in Finite State Machines
We propose a number of techniques for securing finite state machines (FSMs) against fault injection attacks. The proposed security mechanisms are based on physically unclonable fun...
Ghaith Hammouri, Kahraman D. Akdemir, Berk Sunar
ICMLA
2008
15 years 6 months ago
Towards On-line Treatment Verification Using cine EPID for Hypofractionated Lung Radiotherapy
We propose a novel approach for on-line treatment verification using cine EPID (Electronic Portal Imaging Device) images for hypofractionated lung radiotherapy based on a machine ...
Xiaoli Tang, Tong Lin, Steve B. Jiang
ICONIP
2008
15 years 6 months ago
An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites
In this paper, we present the performance of machine learning-based methods for detection of phishing sites. We employ 9 machine learning techniques including AdaBoost, Bagging, S...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
ICONIP
2008
15 years 6 months ago
Improvement of Practical Recurrent Learning Method and Application to a Pattern Classification Task
Practical Recurrent Learning (PRL) has been proposed as a simple learning algorithm for recurrent neural networks[1][2]. This algorithm enables learning with practical order O(n2 )...
Mohamad Faizal Bin Samsudin, Katsunari Shibata
ICONIP
2008
15 years 6 months ago
A Novel Approach for Hardware Based Sound Classification
Several applications would emerge from the development of efficient and robust sound classification systems able to identify the nature of non-speech sound sources. This paper prop...
Mauricio Kugler, Victor Alberto Parcianello Benso,...
« Prev « First page 1357 / 1627 Last » Next »