We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
This paper proposes a novel application of differential evolution to solve a difficult dynamic optimisation or optimal control problem. The miss distance in a missile-target engag...
Abstract. We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions ...
— In this paper, we study the asymptotic behavior of the bit–error probability (BEP) and symbol–error probability (SEP) of differential M–ary phase–shift keying with diff...
In this paper, the development of a computer-aided system for the classification of grade of neuroblastic differentiation is presented. This automated process is carried out withi...
Jun Kong, Olcay Sertel, Hiroyuki Shimada, Kim L. B...