Sciweavers

1518 search results - page 91 / 304
» Cryptographic Test Correction
Sort
View
121
Voted
ISCAS
2005
IEEE
184views Hardware» more  ISCAS 2005»
15 years 9 months ago
An adaptive, truly background calibration method for high speed pipeline ADC design
: This paper presents a self-calibration method for designing high speed pipeline ADCs. Unlike all existing calibration algorithms, the proposed calibration does not insert any tes...
Degang Chen, Zhongjun Yu, Randall L. Geiger
ICANN
2003
Springer
15 years 8 months ago
The Spike Response Model: A Framework to Predict Neuronal Spike Trains
We propose a simple method to map a generic threshold model, namely the Spike Response Model, to artificial data of neuronal activity using a minimal amount of a priori informatio...
Renaud Jolivet, Timothy J. Lewis, Wulfram Gerstner
IJCAI
2007
15 years 5 months ago
Semantic Precision and Recall for Ontology Alignment Evaluation
In order to evaluate ontology matching algorithms it is necessary to confront them with test ontologies and to compare the results with some reference. The most prominent comparis...
Jérôme Euzenat
AAAI
2012
13 years 6 months ago
Evaluating Resistance to False-Name Manipulations in Elections
In many mechanisms (especially online mechanisms), a strategic agent can influence the outcome by creating multiple false identities. We consider voting settings where the mechan...
Bo Waggoner, Lirong Xia, Vincent Conitzer
ITC
2003
IEEE
157views Hardware» more  ITC 2003»
15 years 9 months ago
Parity-Based Concurrent Error Detection in Symmetric Block Ciphers
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption. We will describe a general concurren...
Ramesh Karri, Grigori Kuznetsov, Michael Göss...