Sciweavers

405 search results - page 41 / 81
» Avatar-centric Risk Evaluation
Sort
View
GLVLSI
2007
IEEE
107views VLSI» more  GLVLSI 2007»
15 years 4 months ago
Side-channel resistant system-level design flow for public-key cryptography
In this paper, we propose a new design methodology to assess the risk for side-channel attacks, more specifically timing analysis and simple power analysis, at an early design st...
Kazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingr...
ICIAR
2010
Springer
15 years 2 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
ANOR
2007
81views more  ANOR 2007»
14 years 10 months ago
A conditional-SGT-VaR approach with alternative GARCH models
This paper proposes a conditional technique for the estimation of VaR and expected shortfall measures based on the skewed generalized t (SGT) distribution. The estimation of the co...
Turan G. Bali, Panayiotis Theodossiou
EACL
2010
ACL Anthology
14 years 10 months ago
Assessing the Trade-Off between System Building Cost and Output Quality in Data-to-Text Generation
Abstract. Data-to-text generation systems tend to be knowledge-based and manually built, which limits their reusability and makes them time and cost-intensive to create and maintai...
Anja Belz, Eric Kow
TEC
2010
112views more  TEC 2010»
14 years 4 months ago
Population-Based Algorithm Portfolios for Numerical Optimization
In this paper, we consider the scenario that a population-based algorithm is applied to a numerical optimization problem and a solution needs to be presented within a given time bu...
Fei Peng, Ke Tang, Guoliang Chen, Xin Yao