Sciweavers

4285 search results - page 60 / 857
» Differential Behavioral Analysis
Sort
View
FOCS
2010
IEEE
14 years 7 months ago
The Limits of Two-Party Differential Privacy
We study differential privacy in a distributed setting where two parties would like to perform analysis of their joint data while preserving privacy for both datasets. Our results ...
Andrew McGregor, Ilya Mironov, Toniann Pitassi, Om...
DAC
2005
ACM
15 years 10 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
RECOMB
2009
Springer
15 years 10 months ago
Parameter Synthesis in Nonlinear Dynamical Systems: Application to Systems Biology
The dynamics of biological processes are often modeled as systems of nonlinear ordinary differential equations (ODE). An important feature of nonlinear ODEs is that seemingly minor...
Alexandre Donzé, Gilles Clermont, Axel Lega...
ICC
2007
IEEE
170views Communications» more  ICC 2007»
15 years 4 months ago
A Post-Detection SNR-Aided Timing Recovery Loop for MIMO-OFDM Receivers
--- In this paper, a novel third-order Phase Lock Loop (PLL) is proposed for the timing recovery in MIMO-OFDM systems. It differentiates from conventional timing recovery algorithm...
Wenzhen Li, Masayuki Tomisawa
ICCCN
2007
IEEE
15 years 4 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang