Sciweavers

1369 search results - page 187 / 274
» A Practical Implementation of the Timing Attack
Sort
View
81
Voted
BMCBI
2007
144views more  BMCBI 2007»
14 years 11 months ago
Robust regression for periodicity detection in non-uniformly sampled time-course gene expression data
Background: In practice many biological time series measurements, including gene microarrays, are conducted at time points that seem to be interesting in the biologist's opin...
Miika Ahdesmäki, Harri Lähdesmäki, ...
PC
2008
123views Management» more  PC 2008»
14 years 11 months ago
The impact of heterogeneity on master-slave scheduling
In this paper, we assess the impact of heterogeneity on scheduling independent tasks on master-slave platforms. We assume a realistic one-port model where the master can communica...
Jean-Francois Pineau, Yves Robert, Fréd&eac...
ASE
2005
137views more  ASE 2005»
14 years 11 months ago
Rewriting-Based Techniques for Runtime Verification
Techniques for efficiently evaluating future time Linear Temporal Logic (abbreviated LTL) formulae on finite execution traces are presented. While the standard models of LTL are i...
Grigore Rosu, Klaus Havelund
ICLP
2005
Springer
15 years 4 months ago
OWL: A Description Logic Based Ontology Language
Abstract Description Logics (DLs) are a family of class (concept) based knowledge representation formalisms. They are characterised by the use of various constructors to build comp...
Ian Horrocks
ESAS
2004
Springer
15 years 4 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar