Sciweavers

393 search results - page 27 / 79
» The LCA Problem Revisited
Sort
View
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
16 years 9 days ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
IWCLS
2007
Springer
15 years 11 months ago
Revisiting UCS: Description, Fitness Sharing, and Comparison with XCS
Abstract. This paper provides a deep insight into the learning mechanisms of UCS, a learning classifier system (LCS) derived from XCS that works under a supervised learning scheme...
Albert Orriols-Puig, Ester Bernadó-Mansilla
LPAR
2007
Springer
15 years 11 months ago
How Many Legs Do I Have? Non-Simple Roles in Number Restrictions Revisited
Abstract. The Description Logics underpinning OWL impose a well-known syntactic restriction in order to preserve decidability: they do not allow to use nonsimple roles—that is, t...
Yevgeny Kazakov, Ulrike Sattler, Evgeny Zolin
VL
2006
IEEE
15 years 11 months ago
Gender Differences in End-User Debugging, Revisited: What the Miners Found
We have been working to uncover gender differences in the ways males and females problem solve in end-user programming situations, and have discovered differences in males’ vers...
Valentina Grigoreanu, Laura Beckwith, Xiaoli Z. Fe...
138
Voted
LPNMR
2005
Springer
15 years 11 months ago
Revisiting the Semantics of Interval Probabilistic Logic Programs
Two approaches to logic programming with probabilities emerged over time: bayesian reasoning and probabilistic satisfiability (PSAT). The attractiveness of the former is in tying ...
Alex Dekhtyar, Michael I. Dekhtyar