Sciweavers

6318 search results - page 20 / 1264
» Data Leakage Detection
Sort
View
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
15 years 3 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
ASPDAC
2008
ACM
174views Hardware» more  ASPDAC 2008»
14 years 11 months ago
Chebyshev Affine Arithmetic based parametric yield prediction under limited descriptions of uncertainty
In modern circuit design, it is difficult to provide reliable parametric yield prediction since the real distribution of process data is hard to measure. Most existing approaches ...
Jin Sun, Yue Huang, Jun Li, Janet Meiling Wang
NSDI
2010
14 years 11 months ago
Airavat: Security and Privacy for MapReduce
We present Airavat, a MapReduce-based system which provides strong security and privacy guarantees for distributed computations on sensitive data. Airavat is a novel integration o...
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vit...
IJSNET
2010
122views more  IJSNET 2010»
14 years 8 months ago
Ensuring high sensor data quality through use of online outlier detection techniques
: Data collected by Wireless Sensor Networks (WSNs) are inherently unreliable. Therefore, to ensure high data quality, secure monitoring, and reliable detection of interesting and ...
Yang Zhang, Nirvana Meratnia, Paul J. M. Havinga
ICIP
2003
IEEE
15 years 11 months ago
Analysis and classification of internal pipeline images
Recently developed optical inspection tools provide images from the inside of natural gas pipelines to monitor pipeline integrity. The vast amounts of data generated prohibits hum...
Deirdre B. O'Brien, Maya R. Gupta, Robert M. Gray,...