Sciweavers

81 search results - page 7 / 17
» Solving operational statistics via a Bayesian analysis
Sort
View
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 2 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
IJRR
2010
185views more  IJRR 2010»
14 years 9 months ago
FISST-SLAM: Finite Set Statistical Approach to Simultaneous Localization and Mapping
The solution to the problem of mapping an environment and at the same time using this map to localize (the simultaneous localization and mapping, SLAM, problem) is a key prerequis...
Bharath Kalyan, K. W. Lee, W. Sardha Wijesoma
TCOM
2010
92views more  TCOM 2010»
14 years 9 months ago
Detection of Gaussian constellations in MIMO systems under imperfect CSI
Abstract—This paper considers the problem of Gaussian symbols detection in MIMO systems in the presence of channel estimation errors. Under this framework we develop a computatio...
Ido Nevat, Gareth W. Peters, Jinhong Yuan
92
Voted
KBSE
1999
IEEE
15 years 3 months ago
Automatic Software Clustering via Latent Semantic Analysis
The paper describes the initial results of applying Latent Semantic Analysis (LSA) to program source code and associated documentation. Latent Semantic Analysis is a corpus-based ...
Jonathan I. Maletic, Naveen Valluri
113
Voted
ICICS
2009
Springer
15 years 5 months ago
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
Tomas Olsson