Sciweavers

4041 search results - page 697 / 809
» time 2009
Sort
View
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
15 years 11 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
COCOA
2009
Springer
15 years 9 months ago
On Open Rectangle-of-Influence Drawings of Planar Graphs
: Under water sensor network is an important research direction in computer science. There are many interesting optimization problems regarding its design, routing and applications...
Huaming Zhang, Milind Vaidya
COCOA
2009
Springer
15 years 7 months ago
An Effective Hybrid Algorithm for the Circles and Spheres Packing Problems
stract to be announcedPlenary session 09:00-10:00 Panos M, Pardalos, University of Florida, USA Tea Break 10:00-10:20 At the 1st floor 10:20-10:45 Polynomial Approximation Schemes ...
Jingfa Liu, Yonglei Yao, Yu Zheng, Huantong Geng, ...
CVPR
2009
IEEE
1351views Computer Vision» more  CVPR 2009»
16 years 11 months ago
Support Vector Machines in Face Recognition with Occlusions
Support Vector Machines (SVM) are one of the most useful techniques in classification problems. One clear example is face recognition. However, SVM cannot be applied when the fe...
Aleix M. Martínez, Hongjun Jia
CVPR
2009
IEEE
16 years 11 months ago
Constrained Marginal Space Learning for Efficient 3D Anatomical Structure Detection in Medical Images
Recently, we proposed marginal space learning (MSL) as a generic approach for automatic detection of 3D anatom- ical structures in many medical imaging modalities. To accurately...
Yefeng Zheng, Bogdan Georgescu, Haibin Ling, Shaoh...