Sciweavers

736 search results - page 41 / 148
» Sampling of operators
Sort
View
ESORICS
2002
Springer
15 years 9 months ago
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense
It is believed that masking is an effective countermeasure against power analysis attacks: before a certain operation involving a key is performed in a cryptographic chip, the inpu...
Marcin Gomulkiewicz, Miroslaw Kutylowski
ICPR
2004
IEEE
15 years 11 months ago
A Probabilistic Approach to Learning Costs for Graph Edit Distance
Graph edit distance provides an error-tolerant way to measure distances between attributed graphs. The effectiveness of edit distance based graph classification algorithms relies ...
Horst Bunke, Michel Neuhaus
CACM
2004
212views more  CACM 2004»
14 years 10 months ago
The Spinning Cube of Potential Doom
Darknets are often proposed to monitor for anomalous, externally sourced traffic, and require large, contiguous blocks of unused IP addresses - not always feasible for enterprise ...
Stephen Lau
BMCBI
2004
113views more  BMCBI 2004»
14 years 10 months ago
Leveraging two-way probe-level block design for identifying differential gene expression with high-density oligonucleotide array
Background: To identify differentially expressed genes across experimental conditions in oligonucleotide microarray experiments, existing statistical methods commonly use a summar...
Leah Barrera, Chris Benner, Yong-Chuan Tao, Elizab...
WSC
2004
14 years 11 months ago
A Unified Approach for Finite-Dimensional, Rare-Event Monte Carlo Simulation
We consider the problem of estimating the small probability that a function of a finite number of random variables exceeds a large threshold. Each input random variable may be lig...
Zhi Huang, Perwez Shahabuddin