Sciweavers

817 search results - page 133 / 164
» Robust Euclidean embedding
Sort
View
EDCC
2008
Springer
14 years 11 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
AAAI
2006
14 years 11 months ago
DNNF-based Belief State Estimation
As embedded systems grow increasingly complex, there is a pressing need for diagnosing and monitoring capabilities that estimate the system state robustly. This paper is based on ...
Paul Elliott, Brian C. Williams
BIOSIG
2003
145views Biometrics» more  BIOSIG 2003»
14 years 11 months ago
Pass Phrase Based Speaker Recognition for Authentication
: Speaker recognition in applications of our daily lives is not yet in widespread use. In order for biometric technology to make sense for real-world authentication applications an...
Heinz Hertlein, Robert Frischholz, Elmar Nöth
AUTOMATICA
2010
167views more  AUTOMATICA 2010»
14 years 9 months ago
A new kernel-based approach for linear system identification
This paper describes a new kernel-based approach for linear system identification of stable systems. We model the impulse response as the realization of a Gaussian process whose s...
Gianluigi Pillonetto, Giuseppe De Nicolao
ALIFE
2005
14 years 9 months ago
Self-Organizing Hierarchies in Sensor and Communication Networks
We consider a hierarchical multicellular sensing and communication network, embedded in an ageless aerospace vehicle, that is expected to detect and react to multiple impacts and d...
Mikhail Prokopenko, Peter Wang, Philip Valencia, D...