Sciweavers

4101 search results - page 595 / 821
» Differential Power Analysis
Sort
View
76
Voted
COLING
2010
14 years 7 months ago
Expressing OWL axioms by English sentences: dubious in theory, feasible in practice
With OWL (Web Ontology Language) established as a standard for encoding ontologies on the Semantic Web, interest has begun to focus on the task of verbalising OWL code in controll...
Richard Power, Allan Third
103
Voted
COLING
2010
14 years 7 months ago
Utilizing Variability of Time and Term Content, within and across Users in Session Detection
In this paper, we describe a SVM classification framework of session detection task on both Chinese and English query logs. With eight features on the aspects of temporal and cont...
Shu-Qi Sun, Sheng Li, Muyun Yang, Haoliang Qi, Tie...
105
Voted
COLING
2010
14 years 7 months ago
Learning Phrase Boundaries for Hierarchical Phrase-based Translation
Hierarchical phrase-based models provide a powerful mechanism to capture non-local phrase reorderings for statistical machine translation (SMT). However, many phrase reorderings a...
Zhongjun He, Yao Meng, Hao Yu
107
Voted
CORR
2010
Springer
96views Education» more  CORR 2010»
14 years 7 months ago
Quantifying Information Leakage in Finite Order Deterministic Programs
Information flow analysis is a powerful technique for reasoning about the sensitive information exposed by a program during its execution. While past work has proposed information...
Ji Zhu, Mudhakar Srivatsa
104
Voted
JCS
2011
72views more  JCS 2011»
14 years 7 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin