Sciweavers

5153 search results - page 418 / 1031
» Introduction to Randomized Algorithms
Sort
View
CHES
1999
Springer
140views Cryptology» more  CHES 1999»
15 years 9 months ago
Power Analysis Attacks of Modular Exponentiation in Smartcards
Abstract. Three new types of power analysis attacks against smartcard implementations of modular exponentiation algorithms are described. The first attack requires an adversary to ...
Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sl...
ICASSP
2010
IEEE
15 years 5 months ago
Distance-based discretization of parametric signal manifolds
The characterization of signals and images in manifolds often lead to efficient dimensionality reduction algorithms based on manifold distance computation for analysis or classi...
Elif Vural, Pascal Frossard
COMCOM
2006
103views more  COMCOM 2006»
15 years 5 months ago
Energy efficiency of collision resolution protocols
Energy consumption of the medium access control (MAC) algorithm is one of the key performance metrics in today's ubiquitous wireless networks of battery-operated devices. We ...
Aran Bergman, Moshe Sidi
132
Voted
JMIV
2002
72views more  JMIV 2002»
15 years 4 months ago
Estimating Overcomplete Independent Component Bases for Image Windows
Estimating overcomplete ICA bases for image windows is a difficult problem. Most algorithms require the estimation of values of the independent components which leads to computatio...
Aapo Hyvärinen, Mika Inki
INFORMATICALT
2010
169views more  INFORMATICALT 2010»
15 years 3 months ago
Parameters Estimation in Modelling of Gas-Gap in RBMK Type Reactor Using Bayesian Approach
Abstract. This study presents developed algorithm for assessment and updating estimates of parameters in the mathematical models of non-stationary processes (for instance, system a...
Inga Zutautaite-Seputiene, Juozas Augutis, Laimuti...