Sciweavers

384 search results - page 36 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
CHES
2006
Springer
134views Cryptology» more  CHES 2006»
15 years 5 months ago
Read-Proof Hardware from Protective Coatings
In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient beca...
Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan v...
TCS
2008
15 years 1 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
KDD
2004
ACM
117views Data Mining» more  KDD 2004»
16 years 2 months ago
Regularized multi--task learning
Past empirical work has shown that learning multiple related tasks from data simultaneously can be advantageous in terms of predictive performance relative to learning these tasks...
Theodoros Evgeniou, Massimiliano Pontil
ICNC
2005
Springer
15 years 7 months ago
Novel Leaning Feed-Forward Controller for Accurate Robot Trajectory Tracking
This paper presents a novel learning feed-forward controller design approach for accurate robotics trajectory tracking. Based on the joint nonlinear dynamics characteristics, a mod...
D. Bi, G. L. Wang, Jun Zhang, Q. Xue
NETCOOP
2007
Springer
15 years 8 months ago
Optimal Congestion Control with Multipath Routing Using TCP-FAST and a Variant of RIP
Abstract. This paper discusses an optimization-based approach for congestion control together with multipath routing in a TCP/IP network. In recent research we have shown how natur...
Enrique Mallada, Fernando Paganini