Sciweavers

884 search results - page 88 / 177
» Linear-Input Subset Analysis
Sort
View
ITNG
2006
IEEE
15 years 9 months ago
Side-Channel Leakage Tolerant Architectures
Side-channel attacks compare side-channel leakage predictions or estimations with side-channel leakage measurements. The estimations are based on the exact value of a few select s...
Kris Tiri, Patrick Schaumont, Ingrid Verbauwhede
121
Voted
GIR
2006
ACM
15 years 9 months ago
Exploring Probabilistic Toponym Resolution for Geographical Information Retrieval
A key problem that arises when unstructured text is being queried is that of properly recognizing and exploiting geographical terms and entities. Here we describe a mechanism for ...
Yi Li, Alistair Moffat, Nicola Stokes, Lawrence Ca...
QSIC
2005
IEEE
15 years 8 months ago
Proving the Safety of SQL Queries
Many programs need to access data in a relational database. This is usually done by means of queries written in SQL. Although the language SQL is declarative, certain runtime erro...
Stefan Brass, Christian Goldberg
MSR
2005
ACM
15 years 8 months ago
Recovering system specific rules from software repositories
One of the most successful applications of static analysis based bug finding tools is to search the source code for violations of system-specific rules. These rules may describe h...
Chadd C. Williams, Jeffrey K. Hollingsworth
ICIAR
2005
Springer
15 years 8 months ago
Robust Global Mosaic Topology Estimation for Real-Time Applications
This paper proposes an iterative methodology for real-time robust mosaic topology inference. It tackles the problem of optimal feature selection (optimal sampling) for global estim...
Nuno Pinho da Silva, João Paulo Costeira