Sciweavers

3379 search results - page 49 / 676
» Powers of Two
Sort
View
INFOCOM
2009
IEEE
15 years 5 months ago
Capabilities of Low-Power Wireless Jammers
— In this paper, motivated by the goal of modeling the fine-grain capabilities of jammers for the context of security in low-power wireless networks, we experimentally character...
Lifeng Sang, Anish Arora
NIPS
2008
15 years 11 days ago
On Computational Power and the Order-Chaos Phase Transition in Reservoir Computing
Randomly connected recurrent neural circuits have proven to be very powerful models for online computations when a trained memoryless readout function is appended. Such Reservoir ...
Benjamin Schrauwen, Lars Buesing, Robert A. Legens...
90
Voted
ISBI
2011
IEEE
14 years 2 months ago
Boosting power to detect genetic associations in imaging using multi-locus, genome-wide scans and ridge regression
Most algorithms used for imaging genetics examine statistical effects of each individual genetic variant, one at a time. We developed a new approach, based on ridge regression, to...
Omid Kohannim, Derrek P. Hibar, Jason L. Stein, Ne...
108
Voted
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
14 years 9 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
ICCD
2008
IEEE
118views Hardware» more  ICCD 2008»
15 years 7 months ago
Adaptive techniques for leakage power management in L2 cache peripheral circuits
— Recent studies indicate that a considerable amount of an L2 cache leakage power is dissipated in its peripheral circuits, e.g., decoders, word-lines and I/O drivers. In additio...
Houman Homayoun, Alexander V. Veidenbaum, Jean-Luc...