Sciweavers

3370 search results - page 246 / 674
» Correlation Embedding Analysis
Sort
View
DFT
2008
IEEE
182views VLSI» more  DFT 2008»
15 years 6 months ago
Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis
This paper addresses a new threat to the security of integrated circuits (ICs). The migration of IC fabrication to untrusted foundries has made ICs vulnerable to malicious alterat...
Xiaoxiao Wang, Hassan Salmani, Mohammad Tehranipoo...
EV
2006
78views Hardware» more  EV 2006»
15 years 5 months ago
How E-Voting Technology Challenges Traditional Concepts of Citizenship: an Analysis of French Voting Rituals
: This paper describes the direct relationship between the perception of citizenship and its material expression, with emphasis on how changing expression obliges a rethink of the ...
Laurence Monnoyer-Smith
IMAMS
2003
212views Mathematics» more  IMAMS 2003»
15 years 5 months ago
Watermarking 3D Polygonal Meshes Using the Singular Spectrum Analysis
Watermarking is to embed a structure called a watermark into the target data such as images. The watermark can be used, for example, in order to secure the copyright and detect tam...
Kohei Muratani, Kokichi Sugihara
CHES
2010
Springer
172views Cryptology» more  CHES 2010»
15 years 5 months ago
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009
Random delays are often inserted in embedded software to protect against side-channel and fault attacks. At CHES 2009 a new method for generation of random delays was described tha...
Jean-Sébastien Coron, Ilya Kizhvatov
ICML
2010
IEEE
15 years 5 months ago
An Analysis of the Convergence of Graph Laplacians
Existing approaches to analyzing the asymptotics of graph Laplacians typically assume a well-behaved kernel function with smoothness assumptions. We remove the smoothness assumpti...
Daniel Ting, Ling Huang, Michael I. Jordan