Sciweavers

3395 search results - page 104 / 679
» Computational Differential Privacy
Sort
View
ACSAC
1999
IEEE
15 years 2 months ago
An Application of Machine Learning to Network Intrusion Detection
Differentiating anomalous network activity from normal network traffic is difficult and tedious. A human analyst must search through vast amounts of data to find anomalous sequenc...
Chris Sinclair, Lyn Pierce, Sara Matzner
WISA
2010
Springer
14 years 8 months ago
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
In this paper we present two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES. The first is an imp...
Jean-François Gallais, Ilya Kizhvatov, Mich...
68
Voted
MOC
2010
14 years 5 months ago
On the convergence of Hill's method
Hill's method is a means to numerically approximate spectra of linear differential operators with periodic coefficients. In this paper, we address different issues related to...
Christopher W. Curtis, Bernard Deconinck
87
Voted
CPHYSICS
2007
89views more  CPHYSICS 2007»
14 years 10 months ago
Numerical differentiation of experimental data: local versus global methods
In the context of the analysis of measured data, one is often faced with the task to differentiate data numerically. Typically, this occurs when measured data are concerned or dat...
Karsten Ahnert, Markus Abel
ISBI
2004
IEEE
15 years 11 months ago
Variational Methods and Partial Differential Equations in Cardiac Image Analysis
Cardio-vascular diseases is a major cause of deaths worldwide. Early diagnosis is quite often associated with more efficient treatment leading to a significant decrease of the mor...
Nikos Paragios