Sciweavers

2129 search results - page 154 / 426
» Cutting-Edge Timing Analysis Techniques
Sort
View
TCOS
2010
14 years 4 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...
SIAMREV
2010
110views more  SIAMREV 2010»
14 years 4 months ago
Complex Singularities and the Lorenz Attractor
The Lorenz attractor is one of the best known examples of applied mathematics. However, much of what is known about it is a result of numerical calculations and not of mathematica...
Divakar Viswanath, Sönmez Sahutoglu
CORR
2011
Springer
326views Education» more  CORR 2011»
14 years 4 months ago
Mining User Comment Activity for Detecting Forum Spammers in YouTube
Research shows that comment spamming (comments which are unsolicited, unrelated, abusive, hateful, commercial advertisements etc) in online discussion forums has become a common p...
Ashish Sureka
ISVC
2010
Springer
14 years 8 months ago
Visual Exploration of Stream Pattern Changes Using a Data-Driven Framework
Abstract. When using visualization techniques to explore data streams, an important task is to convey pattern changes. Challenges include: (1) Most data analysis tasks require user...
Zaixian Xie, Matthew O. Ward, Elke A. Rundensteine...
ISAAC
2004
Springer
88views Algorithms» more  ISAAC 2004»
15 years 3 months ago
On the Range Maximum-Sum Segment Query Problem
The range minimum query problem, RMQ for short, is to preprocess a sequence of real numbers A[1 . . . n] for subsequent queries of the form: “Given indices i, j, what is the ind...
Kuan-Yu Chen, Kun-Mao Chao