Sciweavers

427 search results - page 55 / 86
» Content Search through Comparisons
Sort
View
FDTC
2010
Springer
124views Cryptology» more  FDTC 2010»
14 years 9 months ago
Optical Fault Masking Attacks
This paper introduces some new types of optical fault attacks called fault masking attacks. These attacks are aimed at disrupting of the normal memory operation through preventing ...
Sergei Skorobogatov
ICALP
2005
Springer
15 years 5 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
PVLDB
2010
150views more  PVLDB 2010»
14 years 10 months ago
Tree Indexing on Solid State Drives
Large flash disks, or solid state drives (SSDs), have become an attractive alternative to magnetic hard disks, due to their high random read performance, low energy consumption a...
Yinan Li, Bingsheng He, Jun Yang 0001, Qiong Luo, ...
ICDE
2007
IEEE
173views Database» more  ICDE 2007»
16 years 1 months ago
Annotating Structured Data of the Deep Web
An increasing number of databases have become Web accessible through HTML form-based search interfaces. The data units returned from the underlying database are usually encoded in...
Yiyao Lu, Hai He, Hongkun Zhao, Weiyi Meng, Clemen...
ICML
2006
IEEE
16 years 18 days ago
Active learning via transductive experimental design
This paper considers the problem of selecting the most informative experiments x to get measurements y for learning a regression model y = f(x). We propose a novel and simple conc...
Kai Yu, Jinbo Bi, Volker Tresp