Sciweavers

3212 search results - page 107 / 643
» Faster Concept Analysis
Sort
View
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
15 years 7 months ago
An Analysis of the Compact XSL Attack on BES and Embedded SMS4
The XSL attack when applied on BES-128 has been shown to have an attack complexity of 2100 , which is faster than exhaustive search. However at FSE 2007, Lim and Khoo analyzed the ...
Jiali Choy, Huihui Yap, Khoongming Khoo
ASPDAC
2009
ACM
143views Hardware» more  ASPDAC 2009»
15 years 7 months ago
Statistical modeling and analysis of chip-level leakage power by spectral stochastic method
In this paper, we present a novel statistical full-chip leakage power analysis method. The new method can provide a general framework to derive the full-chip leakage current or po...
Ruijing Shen, Ning Mi, Sheldon X.-D. Tan, Yici Cai...
GLOBECOM
2008
IEEE
15 years 7 months ago
Support Vector Machines and Random Forests Modeling for Spam Senders Behavior Analysis
— Unwanted and malicious messages dominate Email traffic and pose a great threat to the utility of email communications. Reputation systems have been getting momentum as the sol...
Yuchun Tang, Sven Krasser, Yuanchen He, Weilai Yan...
ESOP
2007
Springer
15 years 7 months ago
Static Analysis by Policy Iteration on Relational Domains
We give a new practical algorithm to compute, in finite time, a fixpoint (and often the least fixpoint) of a system of equations in the abstract numerical domains of zones and t...
Stephane Gaubert, Eric Goubault, Ankur Taly, Sarah...
98
Voted
SAS
2007
Springer
128views Formal Methods» more  SAS 2007»
15 years 7 months ago
Magic-Sets Transformation for the Analysis of Java Bytecode
Denotational static analysis of Java bytecode has a nice and clean compositional definition and an efficient implementation with binary decision diagrams. But it models only the f...
Étienne Payet, Fausto Spoto