Sciweavers

1245 search results - page 196 / 249
» Binary Sparse Coding
Sort
View
AROBOTS
2006
120views more  AROBOTS 2006»
15 years 3 months ago
A biomimetic robot for tracking specific odors in turbulent plumes
Two basic tasks must be performed by an olfactory robot tracking a specific odor source : navigate in a turbulent odor plume and recognize an odor regardless of its concentration....
Dominique Martinez, Olivier Rochel, Etienne Hugues
TIT
2002
102views more  TIT 2002»
15 years 2 months ago
Asymptotic efficiency of two-stage disjunctive testing
Abstract--We adapt methods originally developed in information and coding theory to solve some testing problems. The efficiency of two-stage pool testing of items is characterized ...
Toby Berger, Vladimir I. Levenshtein
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
15 years 1 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
RAID
2010
Springer
15 years 1 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
ISSRE
2010
IEEE
15 years 28 days ago
Preventing Overflow Attacks by Memory Randomization
Buffer overflow is known to be a common memory vulnerability affecting software. It is exploited to gain various kinds of privilege escalation. C and C++ are very commonly used to ...
Vivek Iyer, Amit Kanitkar, Partha Dasgupta, Raghun...