Sciweavers

8031 search results - page 1389 / 1607
» Knowledge and Workflow Systems
Sort
View
EDCC
2008
Springer
15 years 22 days ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
EUROPAR
2008
Springer
15 years 22 days ago
DGSim: Comparing Grid Resource Management Architectures through Trace-Based Simulation
Abstract. Many advances in grid resource management are still required to realize the grid computing vision of the integration of a worldwide computing infrastructure for scientifi...
Alexandru Iosup, Omer Ozan Sonmez, Dick H. J. Epem...
EWRL
2008
15 years 22 days ago
New Error Bounds for Approximations from Projected Linear Equations
We consider linear fixed point equations and their approximations by projection on a low dimensional subspace. We derive new bounds on the approximation error of the solution, whi...
Huizhen Yu, Dimitri P. Bertsekas
FASE
2008
Springer
15 years 22 days ago
Regular Inference for State Machines Using Domains with Equality Tests
Abstract. Existing algorithms for regular inference (aka automata learning) allows to infer a finite state machine by observing the output that the machine produces in response to ...
Therese Berg, Bengt Jonsson, Harald Raffelt
FGR
2008
IEEE
156views Biometrics» more  FGR 2008»
15 years 22 days ago
Modelling human perception of static facial expressions
Data collected through a recent web-based survey show that the perception (i.e. labeling) of a human facial expression by a human observer is a subjective process, which results i...
Matteo Sorci, Jean-Philippe Thiran, J. Cruz, T. Ro...
« Prev « First page 1389 / 1607 Last » Next »