L1 (also referred to as the 1-norm or Lasso) penalty based formulations have been shown to be effective in problem domains when noisy features are present. However, the L1 penalty...
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Ontologies are gaining popularity in many domains as a way of representing, dealing and reasoning with large volumes of information, and they are starting to play a major role in ...
Abstract. In Wireless Sensor Networks (WSNs) the majority of the devices provide access to the Received Signal Strength Indicator (RSSI), which has been used as a means to enable d...
Andrea Bardella, Nicola Bui, Andrea Zanella, Miche...
With the ever-increasing growth of the Internet, numerous copies of documents become serious problem for search engine, opinion mining and many other web applications. Since parti...