Sciweavers

686 search results - page 64 / 138
» Tradeoff analysis between knowledge assessment approaches
Sort
View
CHES
2008
Springer
260views Cryptology» more  CHES 2008»
15 years 1 months ago
Mutual Information Analysis
We propose a generic information-theoretic distinguisher for differential side-channel analysis. Our model of side-channel leakage is a refinement of the one given by Standaert et ...
Benedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart ...
ICSM
2005
IEEE
15 years 5 months ago
Analyzing Feature Traces to Incorporate the Semantics of Change in Software Evolution Analysis
Many of the approaches that analyze software evolution consider a static perspective of a system. Static analysis approaches focus on the evolution of static software entities suc...
Orla Greevy, Stéphane Ducasse, Tudor G&icir...
SP
2008
IEEE
122views Security Privacy» more  SP 2008»
14 years 11 months ago
Large-scale phylogenetic analysis on current HPC architectures
Abstract. Phylogenetic inference is considered a grand challenge in Bioinformatics due to its immense computational requirements. The increasing popularity and availability of larg...
Michael Ott, Jaroslaw Zola, Srinivas Aluru, Andrew...
ICECCS
2007
IEEE
95views Hardware» more  ICECCS 2007»
15 years 6 months ago
A Novel Approach to the Detection of Cheating in Multiplayer Online Games
— Modern online multiplayer games are complex heterogeneous distributed systems comprised of servers and untrusted clients, which are often engineered under considerable commerci...
Peter Laurens, Richard F. Paige, Phillip J. Brooke...
ADMA
2005
Springer
202views Data Mining» more  ADMA 2005»
15 years 1 months ago
A Latent Usage Approach for Clustering Web Transaction and Building User Profile
Web transaction data between web visitors and web functionalities usually convey users’ task-oriented behavior patterns. Clustering web transactions, thus, may capture such infor...
Yanchun Zhang, Guandong Xu, Xiaofang Zhou