Sciweavers

908 search results - page 49 / 182
» Additional methods when using email for teaching
Sort
View
CHES
2008
Springer
144views Cryptology» more  CHES 2008»
15 years 6 months ago
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
Abstract. This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate...
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Ak...
UAI
2008
15 years 5 months ago
Small Sample Inference for Generalization Error in Classification Using the CUD Bound
Confidence measures for the generalization error are crucial when small training samples are used to construct classifiers. A common approach is to estimate the generalization err...
Eric Laber, Susan Murphy
TCAD
2008
215views more  TCAD 2008»
15 years 4 months ago
Total Energy Minimization of Real-Time Tasks in an On-Chip Multiprocessor Using Dynamic Voltage Scaling Efficiency Metric
Abstract--This paper proposes an algorithm that provides both dynamic voltage scaling and power shutdown to minimize the total energy consumption of an application executed on an o...
Hyunjin Kim, Hyejeong Hong, Hong-Sik Kim, Jin-Ho A...
INFOCOM
2007
IEEE
15 years 10 months ago
Using Low-Power Modes for Energy Conservation in Ethernet LANs
—Most Ethernet interfaces available for deployment in switches and hosts today can operate in a variety of different low power modes. However, currently these modes have very lim...
Maruti Gupta, Suresh Singh
IRI
2007
IEEE
15 years 10 months ago
Automated Multimedia Systems Training Using Association Rule Mining
User feedback is widely deployed in recent multimedia research to refine retrieval performance. However, most of the existing online learning algorithms handle interactions of a s...
Na Zhao, Shu-Ching Chen, Stuart Harvey Rubin