Sciweavers

10289 search results - page 40 / 2058
» Standard bases in K
Sort
View
JSA
2007
89views more  JSA 2007»
15 years 1 months ago
Robust codes and robust, fault-tolerant architectures of the Advanced Encryption Standard
— Hardware implementations of cryptographic algorithms are vulnerable to fault analysis attacks. Methods based on traditional fault-tolerant architectures are not suited for prot...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
EPIA
2009
Springer
15 years 8 months ago
An Algorithm to Discover the k-Clique Cover in Networks
Abstract. In social network analysis, a k-clique is a relaxed clique, i.e., a kclique is a quasi-complete sub-graph. A k-clique in a graph is a sub-graph where the distance between...
Luís Cavique, Armando B. Mendes, Jorge M. A...
PRL
2006
99views more  PRL 2006»
15 years 1 months ago
An ensemble-driven k-NN approach to ill-posed classification problems
This paper addresses the supervised classification of remote-sensing images in problems characterized by relatively small-size training sets with respect to the input feature spac...
Mingmin Chi, Lorenzo Bruzzone
MICS
2010
124views more  MICS 2010»
14 years 8 months ago
An Optimal Algorithm for the k-Fixed-Endpoint Path Cover on Proper Interval Graphs
In this paper we consider the k-fixed-endpoint path cover problem on proper interval graphs, which is a generalization of the path cover problem. Given a graph G and a set T of k v...
George B. Mertzios, Walter Unger
WDAG
2005
Springer
85views Algorithms» more  WDAG 2005»
15 years 7 months ago
Time and Space Lower Bounds for Implementations Using k-CAS
This paper presents lower bounds on the time- and space-complexity of implementations that use the k compare-and-swap (k-CAS) synchronization primitives. We prove that the use of ...
Hagit Attiya, Danny Hendler