Sciweavers

753 search results - page 122 / 151
» Statistical Measurement of Information Leakage
Sort
View
148
Voted
ENTCS
2008
144views more  ENTCS 2008»
15 years 1 days ago
Platform Independent Timing of Java Virtual Machine Bytecode Instructions
The accurate measurement of the execution time of Java bytecode is one factor that is important in order to estimate the total execution time of a Java application running on a Ja...
Jonathan M. Lambert, James F. Power
103
Voted
TVCG
2010
152views more  TVCG 2010»
14 years 11 months ago
On the Fractal Dimension of Isosurfaces
—A (3D) scalar grid is a regular n1 × n2 × n3 grid of vertices where each vertex v is associated with some scalar value sv. Applying trilinear interpolation, the scalar grid de...
Marc Khoury, Rephael Wenger
105
Voted
MASS
2010
157views Communications» more  MASS 2010»
14 years 10 months ago
Spatial extension of the Reality Mining Dataset
Data captured from a live cellular network with the real users during their common daily routine help to understand how the users move within the network. Unlike the simulations wi...
Michal Ficek, Lukas Kencl
DAC
2009
ACM
14 years 10 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
EXACT
2009
14 years 10 months ago
Explaining a Result to the End-User: A Geometric Approach for Classification Problems
This paper addresses the issue of the explanation of the result given to the end-user by a classifier, when it is used as a decision support system. We consider machine learning cl...
Isabelle Alvarez, Sophie Martin