Sciweavers

1003 search results - page 112 / 201
» Graphical Analysis of Value of Information in Decision Model...
Sort
View
96
Voted
ITCC
2005
IEEE
15 years 6 months ago
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
Abstract— Masking is a general method used to thwart Differential Power Analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values...
François-Xavier Standaert, Eric Peeters, Je...
109
Voted
ACMICEC
2007
ACM
154views ECommerce» more  ACMICEC 2007»
15 years 4 months ago
Learning and adaptivity in interactive recommender systems
Recommender systems are intelligent E-commerce applications that assist users in a decision-making process by offering personalized product recommendations during an interaction s...
Tariq Mahmood, Francesco Ricci
98
Voted
JSSPP
2005
Springer
15 years 6 months ago
Modeling User Runtime Estimates
User estimates of job runtimes have emerged as an important component of the workload on parallel machines, and can have a significant impact on how a scheduler treats different ...
Dan Tsafrir, Yoav Etsion, Dror G. Feitelson
EMS
2008
IEEE
15 years 2 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
97
Voted
SAC
2006
ACM
15 years 6 months ago
Digital geometry image analysis for medical diagnosis
This paper describes a new medical image analysis technique for polygon mesh surfaces of human faces for a medical diagnosis application. The goal is to explore the natural patter...
Jiandong Fang, Shiaofen Fang, Jeffrey Huang, Mihra...