Sciweavers

4815 search results - page 656 / 963
» A Pattern Approach to Modeling the Provider Selection Proble...
Sort
View
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 11 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
ICCAD
1994
IEEE
117views Hardware» more  ICCAD 1994»
15 years 9 months ago
Optimization of critical paths in circuits with level-sensitive latches
A simple extension of the critical path method is presented which allows more accurate optimization of circuits with level-sensitive latches. The extended formulation provides a s...
Timothy M. Burks, Karem A. Sakallah
174
Voted
SEC
2000
15 years 6 months ago
Improving Packet Filters Management through Automatic and Dynamic Schemes
: The development of complex access control architectures raises the problem of their management. In this article, we describe an architecture providing packet filters configuratio...
Olivier Paul, Maryline Laurent
MM
2006
ACM
108views Multimedia» more  MM 2006»
15 years 11 months ago
Video search reranking via information bottleneck principle
We propose a novel and generic video/image reranking algorithm, IB reranking, which reorders results from text-only searches by discovering the salient visual patterns of relevant...
Winston H. Hsu, Lyndon S. Kennedy, Shih-Fu Chang
148
Voted
BMCBI
2008
129views more  BMCBI 2008»
15 years 5 months ago
An analytic and systematic framework for estimating metabolic flux ratios from 13C tracer experiments
Background: Metabolic fluxes provide invaluable insight on the integrated response of a cell to environmental stimuli or genetic modifications. Current computational methods for e...
Ari Rantanen, Juho Rousu, Paula Jouhten, Nicola Za...