Sciweavers

10608 search results - page 1862 / 2122
» Complexity of O'Hara's Algorithm
Sort
View
105
Voted
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
15 years 1 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
115
Voted
CIIA
2009
15 years 1 months ago
LCF-style for Secure Verification Platform based on Multiway Decision Graphs
Abstract. Formal verification of digital systems is achieved, today, using one of two main approaches: states exploration (mainly model checking and equivalence checking) or deduct...
Sa'ed Abed, Otmane Aït Mohamed
CIMAGING
2009
265views Hardware» more  CIMAGING 2009»
15 years 1 months ago
Multi-object segmentation using coupled nonparametric shape and relative pose priors
We present a new method for multi-object segmentation in a maximum a posteriori estimation framework. Our method is motivated by the observation that neighboring or coupling objec...
Mustafa Gökhan Uzunbas, Octavian Soldea, M&uu...
239
Voted
ECAI
2010
Springer
15 years 1 months ago
Bayesian Monte Carlo for the Global Optimization of Expensive Functions
In the last decades enormous advances have been made possible for modelling complex (physical) systems by mathematical equations and computer algorithms. To deal with very long run...
Perry Groot, Adriana Birlutiu, Tom Heskes
CLEF
2009
Springer
15 years 1 months ago
Morphological Analysis by Multiple Sequence Alignment
In biological sequence processing, Multiple Sequence Alignment (MSA) techniques capture information about long-distance dependencies and the three-dimensional structure of protein ...
Tzvetan Tchoukalov, Christian Monson, Brian Roark
« Prev « First page 1862 / 2122 Last » Next »