Sciweavers

5903 search results - page 1073 / 1181
» Signal Processing
Sort
View
CCS
2011
ACM
14 years 5 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...
CCS
2011
ACM
14 years 5 months ago
Televisions, video privacy, and powerline electromagnetic interference
We conduct an extensive study of information leakage over the powerline infrastructure from eight televisions (TVs) spanning multiple makes, models, and underlying technologies. I...
Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak...
TSP
2012
14 years 16 days ago
Distributed Covariance Estimation in Gaussian Graphical Models
—We consider distributed estimation of the inverse covariance matrix in Gaussian graphical models. These models factorize the multivariate distribution and allow for efficient d...
Ami Wiesel, Alfred O. Hero
CONCUR
2000
Springer
15 years 9 months ago
The Control of Synchronous Systems
In the synchronous composition of processes, one process may prevent another process from proceeding unless compositions without a wellde ned productbehavior are ruled out. They ca...
Luca de Alfaro, Thomas A. Henzinger, Freddy Y. C. ...
BMCBI
2006
104views more  BMCBI 2006»
15 years 5 months ago
MANET: tracing evolution of protein architecture in metabolic networks
Background: Cellular metabolism can be characterized by networks of enzymatic reactions and transport processes capable of supporting cellular life. Our aim is to find evolutionar...
Hee Shin Kim, Jay E. Mittenthal, Gustavo Caetano-A...
« Prev « First page 1073 / 1181 Last » Next »