Sciweavers

9382 search results - page 231 / 1877
» A Functional Model for Data Analysis
Sort
View
CSFW
2009
IEEE
15 years 9 months ago
Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code
Specification documents for real-world authentication protocols typically mandate some aspects of a protocol's behavior but leave other features optional or undefined. In add...
Phillip Rogaway, Till Stegers
BIBE
2004
IEEE
179views Bioinformatics» more  BIBE 2004»
15 years 9 months ago
Incorporating Ontology-Driven Similarity Knowledge into Functional Genomics: An Exploratory Study
This research explores the feasibility of semantic similarity approaches to supporting predictive tasks in functional genomics. It aims to establish potential relationships betwee...
Francisco Azuaje, Olivier Bodenreider
WSC
2007
15 years 7 months ago
Visualization techniques utilizing the sensitivity analysis of models
Models of real world systems are being increasingly generated from data that describes the behaviour of systems. Data mining techniques, such as Artificial Neural Networks (ANN),...
Ivo Kondapaneni, Pavel Kordík, Pavel Slav&i...
IDA
2009
Springer
15 years 3 months ago
Hierarchical Extraction of Independent Subspaces of Unknown Dimensions
Abstract. Independent Subspace Analysis (ISA) is an extension of Independent Component Analysis (ICA) that aims to linearly transform a random vector such as to render groups of it...
Peter Gruber, Harold W. Gutch, Fabian J. Theis
CHES
2004
Springer
230views Cryptology» more  CHES 2004»
15 years 11 months ago
Correlation Power Analysis with a Leakage Model
Abstract. A classical model is used for the power consumption of cryptographic devices. It is based on the Hamming distance of the data handled with regard to an unknown but consta...
Eric Brier, Christophe Clavier, Francis Olivier