Sciweavers

2370 search results - page 220 / 474
» The Characterization of Data-Accumulating Algorithms
Sort
View
127
Voted
CAISE
2009
Springer
15 years 10 months ago
Pattern Mining in System Logs: Opportunities for Process Improvement
Enterprise systems implementations are often accompanied by changes in the business processes of the organizations in which they take place. However, not all the changes are desira...
Dolev Mezebovsky, Pnina Soffer, Ilan Shimshoni
119
Voted
FDTC
2009
Springer
104views Cryptology» more  FDTC 2009»
15 years 10 months ago
Low Voltage Fault Attacks on the RSA Cryptosystem
—Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptograph...
Alessandro Barenghi, Guido Bertoni, Emanuele Parri...
131
Voted
SCALESPACE
2009
Springer
15 years 10 months ago
On Level-Set Type Methods for Recovering Piecewise Constant Solutions of Ill-Posed Problems
We propose a regularization method for solving ill-posed problems, under the assumption that the solutions are piecewise constant functions with unknown level sets and unknown leve...
Adriano DeCezaro, Antonio Leitão, Xue-Cheng...
133
Voted
SEMWEB
2009
Springer
15 years 10 months ago
Analysis of a Real Online Social Network Using Semantic Web Frameworks
Abstract. Social Network Analysis (SNA) provides graph algorithms to characterize the structure of social networks, strategic positions in these networks, specific sub-networks and...
Guillaume Erétéo, Michel Buffa, Fabi...
CDC
2008
IEEE
15 years 10 months ago
Effects of topology in networked systems: Stochastic methods and small worlds
— The topology of a networked control system has critical consequences for its performance. We provide first substantial examples on the effects of topology. Then we proceed to ...
John S. Baras, Pedram Hovareshti