Sciweavers

667 search results - page 16 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
ECAI
2010
Springer
14 years 11 months ago
Kernel Methods for Revealed Preference Analysis
In classical revealed preference analysis we are given a sequence of linear prices (i.e., additive over goods) and an agent's demand at each of the prices. The problem is to d...
Sébastien Lahaie
ICPR
2010
IEEE
15 years 2 months ago
Face Recognition Using a Multi-Manifold Discriminant Analysis Method
—In this paper, we propose a Multi-Manifold Discriminant Analysis (MMDA) method for face feature extraction and face recognition, which is based on graph embedded learning and un...
Wankou Yang, Changyin Sun, Lei Zhang
CHES
2006
Springer
146views Cryptology» more  CHES 2006»
15 years 1 months ago
Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits
This paper presents a Path Swapping (PS) method which enables to enhance the security of Quasi Delay Insensitive Asynchronous Circuits against Power Analysis (PA) attack. This appr...
G. Fraidy Bouesse, Gilles Sicard, Marc Renaudin
ICPR
2002
IEEE
15 years 11 months ago
The Performance Analysis of a Chi-square Similarity Measure for Topic Related Clustering of Noisy Transcripts
The goal of the paper is to present a novel Chi-square similarity measure and assess its performance through comparison with well-known similarity measures such as Cosine, Dice, a...
Oktay Ibrahimov, Ishwar K. Sethi, Nevenka Dimitrov...
ATAL
2008
Springer
14 years 11 months ago
Analysis of an evolutionary reinforcement learning method in a multiagent domain
Many multiagent problems comprise subtasks which can be considered as reinforcement learning (RL) problems. In addition to classical temporal difference methods, evolutionary algo...
Jan Hendrik Metzen, Mark Edgington, Yohannes Kassa...