Side-channel attacks compare side-channel leakage predictions or estimations with side-channel leakage measurements. The estimations are based on the exact value of a few select s...
A key problem that arises when unstructured text is being queried is that of properly recognizing and exploiting geographical terms and entities. Here we describe a mechanism for ...
Yi Li, Alistair Moffat, Nicola Stokes, Lawrence Ca...
Many programs need to access data in a relational database. This is usually done by means of queries written in SQL. Although the language SQL is declarative, certain runtime erro...
One of the most successful applications of static analysis based bug finding tools is to search the source code for violations of system-specific rules. These rules may describe h...
This paper proposes an iterative methodology for real-time robust mosaic topology inference. It tackles the problem of optimal feature selection (optimal sampling) for global estim...