Sciweavers

12257 search results - page 2179 / 2452
» Analysis of Algorithms
Sort
View
FPL
2008
Springer
157views Hardware» more  FPL 2008»
15 years 5 months ago
Chosen-message SPA attacks against FPGA-based RSA hardware implementations
This paper presents SPA (Simple Power Analysis) attacks against public-key cryptosystems implemented on an FPGA platform. The SPA attack investigates a power waveform generated by...
Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Ak...
FSE
2008
Springer
91views Cryptology» more  FSE 2008»
15 years 5 months ago
SWIFFT: A Modest Proposal for FFT Hashing
We propose SWIFFT, a collection of compression functions that are highly parallelizable and admit very efficient implementations on modern microprocessors. The main technique under...
Vadim Lyubashevsky, Daniele Micciancio, Chris Peik...
AAAI
2010
15 years 5 months ago
Multi-Instance Dimensionality Reduction
Multi-instance learning deals with problems that treat bags of instances as training examples. In single-instance learning problems, dimensionality reduction is an essential step ...
Yu-Yin Sun, Michael K. Ng, Zhi-Hua Zhou
BIOCOMP
2008
15 years 5 months ago
Identifying Protein Flexibility by NMA
- Here proposed apriori method for identification of protein flexibility relies on one end-state conformation of the protein. This method has comparative advantage over many others...
Kresimir Sikic, Branko Jeren, Sanja Tomic
136
Voted
CAINE
2008
15 years 5 months ago
Hierarchical Clustering of Features on Categorical Data of Biomedical Applications
Data mining became increasingly important in bioinformatics and biomedical area during last decade. Various data mining methods, such as association rule mining and clustering, ha...
Yi Lu, Lily R. Liang
« Prev « First page 2179 / 2452 Last » Next »