Sciweavers

6042 search results - page 1076 / 1209
» Repeated Observation Models
Sort
View
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
15 years 2 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
DSN
2009
IEEE
15 years 2 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
147
Voted
EMNLP
2009
15 years 2 months ago
Bilingually-Constrained (Monolingual) Shift-Reduce Parsing
Jointly parsing two languages has been shown to improve accuracies on either or both sides. However, its search space is much bigger than the monolingual case, forcing existing ap...
Liang Huang, Wenbin Jiang, Qun Liu
GEM
2009
15 years 2 months ago
Evidence of Coevolution in Multi-objective Evolutionary Algorithms
- This paper demonstrates that simple yet important characteristics of coevolution can occur in evolutionary algorithms when only a few conditions are met. We find that interaction...
James Whitacre
GI
2009
Springer
15 years 2 months ago
Rao-Blackwellized Particle Filter for Security Surveillance
: Nowadays, the necessity of safeguarded environments is stronger than ever. The defence of public areas against terroristic threats requires intelligent security assistance system...
Felix Govaers, Monika Wieneke
« Prev « First page 1076 / 1209 Last » Next »