Sciweavers

7200 search results - page 30 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
83
Voted
SIMPRA
2010
73views more  SIMPRA 2010»
15 years 8 days ago
A computational intelligence-based suite for vulnerability assessment of electrical power systems
Ahmed M. A. Haidar, Azah Mohamed, Federico Milano
65
Voted
TOMS
2010
75views more  TOMS 2010»
15 years 7 days ago
Computing correctly rounded integer powers in floating-point arithmetic
Peter Kornerup, Christoph Quirin Lauter, Vincent L...
CISS
2010
IEEE
14 years 5 months ago
Limiting false data attacks on power system state estimation
Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...
109
Voted
CCS
2011
ACM
14 years 1 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...
119
Voted
INFOCOM
2012
IEEE
13 years 4 months ago
Jointly optimal bit loading, channel pairing and power allocation for multi-channel relaying
Abstract—We aim to enhance the end-to-end rate of a general dual-hop relay network with multiple channels and finite modulation formats, by jointly optimizing channel pairing, p...
Mahdi Hajiaghayi, Min Dong, Ben Liang