Sciweavers

4511 search results - page 581 / 903
» Observation Based System Security
Sort
View
IUI
2000
ACM
15 years 9 months ago
Learning to recommend from positive evidence
In recent years, many systems and approaches for recommending information, products or other objects have been developed. In these systems, often machine learning methods that nee...
Ingo Schwab, Wolfgang Pohl, Ivan Koychev
MVA
2002
128views Computer Vision» more  MVA 2002»
15 years 4 months ago
Application to the Traffic Occlusion with Multiple Views
Recently, since the traffic is increasing every year, the problems of traffic jam and accidents, and so on, are increasing, it is required that the ITS (Intelligent Transport Syst...
Tameharu Hasegawa, Heitoh Zen
186
Voted
CASES
2010
ACM
15 years 2 months ago
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software
The Advanced Encryption Standard is used in almost every new embedded application that needs a symmetric-key cipher. In such embedded applications, high-performance as well as res...
Ambuj Sinha, Zhimin Chen, Patrick Schaumont
EUROCRYPT
2010
Springer
15 years 9 months ago
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles an...
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tr...
151
Voted
RTSS
2009
IEEE
15 years 11 months ago
New Response Time Bounds for Fixed Priority Multiprocessor Scheduling
Recently, there have been several promising techniques developed for schedulability analysis and response time analysis for multiprocessor systems based on over-approximation. Thi...
Nan Guan, Martin Stigge, Wang Yi, Ge Yu