Sciweavers

667 search results - page 33 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 5 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
TIT
2002
67views more  TIT 2002»
14 years 11 months ago
A statistical-mechanics approach to large-system analysis of CDMA multiuser detectors
We present a theory, based on statistical mechanics, to evaluate analytically the performance of uncoded, fully synchronous, randomly spread code-division multiple-access (CDMA) mu...
Toshiyuki Tanaka
TKDE
1998
122views more  TKDE 1998»
14 years 11 months ago
The Design and Implementation of Seeded Trees: An Efficient Method for Spatial Joins
—Existing methods for spatial joins require pre-existing spatial indices or other precomputation, but such approaches are inefficient and limited in generality. Operand data sets...
Ming-Ling Lo, Chinya V. Ravishankar
OOPSLA
2007
Springer
15 years 6 months ago
Statistically rigorous java performance evaluation
Java performance is far from being trivial to benchmark because it is affected by various factors such as the Java application, its input, the virtual machine, the garbage collect...
Andy Georges, Dries Buytaert, Lieven Eeckhout
BMCBI
2006
155views more  BMCBI 2006»
14 years 12 months ago
A powerful method for detecting differentially expressed genes from GeneChip arrays that does not require replicates
Background: Studies of differential expression that use Affymetrix GeneChip arrays are often carried out with a limited number of replicates. Reasons for this include financial co...
Anne-Mette K. Hein, Sylvia Richardson