Sciweavers

9290 search results - page 1666 / 1858
» The Predictability of Data Values
Sort
View
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
15 years 5 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
CIBCB
2009
IEEE
15 years 5 months ago
rnaDesign: Local search for RNA secondary structure design
Abstract-- The RNA secondary structure design (SSD) problem is a recently emerging research topic motivated by applications such as customized drug design and the self-assembly of ...
Denny C. Dai, Herbert H. Tsang, Kay C. Wiese
ECAI
2010
Springer
15 years 5 months ago
Unsupervised Layer-Wise Model Selection in Deep Neural Networks
Abstract. Deep Neural Networks (DNN) propose a new and efficient ML architecture based on the layer-wise building of several representation layers. A critical issue for DNNs remain...
Ludovic Arnold, Hélène Paugam-Moisy,...
ESA
2010
Springer
170views Algorithms» more  ESA 2010»
15 years 5 months ago
Streaming Graph Computations with a Helpful Advisor
Motivated by the trend to outsource work to commercial cloud computing services, we consider a variation of the streaming paradigm where a streaming algorithm can be assisted by a...
Graham Cormode, Michael Mitzenmacher, Justin Thale...
DAIS
2009
15 years 5 months ago
Exploiting Synergies between Coexisting Overlays
Overlay networks have emerged as a powerful paradigm to realise a large range of distributed services. However, as the number of overlays grows and the systems that use them become...
Shen Lin 0003, François Taïani, Gordon...
« Prev « First page 1666 / 1858 Last » Next »