Sciweavers

1723 search results - page 209 / 345
» Predicting the Performance of IDA* using Conditional Distrib...
Sort
View
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
15 years 8 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
LREC
2008
119views Education» more  LREC 2008»
15 years 6 months ago
Text Independent Speaker Identification in Multilingual Environments
Speaker identification and verification systems have a poor performance when model training is done in one language while the testing is done in another. This situation is not unu...
Iker Luengo, Eva Navas, Iñaki Sainz, Ibon S...
AUTOMATICA
2006
152views more  AUTOMATICA 2006»
15 years 4 months ago
Simulation-based optimization of process control policies for inventory management in supply chains
A simulation-based optimization framework involving simultaneous perturbation stochastic approximation (SPSA) is presented as a means for optimally specifying parameters of intern...
Jay D. Schwartz, Wenlin Wang, Daniel E. Rivera
COMCOM
2006
148views more  COMCOM 2006»
15 years 4 months ago
An adaptive bluetooth packet selection and scheduling scheme in interference environments
Bluetooth is a new technology for Wireless Personal Area Networks (WPANs). It intends to eliminate the need of wires and connectors between a variety of devices, like PCs and thei...
Chen-Han Shih, Kuochen Wang, Hung-Cheng Shih
TIP
2008
256views more  TIP 2008»
15 years 4 months ago
Image-Based Human Age Estimation by Manifold Learning and Locally Adjusted Robust Regression
Estimating human age automatically via facial image analysis has lots of potential real-world applications, such as human computer interaction and multimedia communication. However...
Guodong Guo, Yun Fu, Charles R. Dyer, Thomas S. Hu...