Sciweavers

4911 search results - page 282 / 983
» Tree dependence analysis
Sort
View
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
15 years 10 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
DAC
2005
ACM
16 years 5 months ago
Correlation-preserved non-gaussian statistical timing analysis with quadratic timing model
Recent study shows that the existing first order canonical timing model is not sufficient to represent the dependency of the gate delay on the variation sources when processing an...
Lizheng Zhang, Weijen Chen, Yuhen Hu, John A. Gubn...
128
Voted
PRDC
2009
IEEE
15 years 11 months ago
Evaluating the Use of Reference Run Models in Fault Injection Analysis
—Fault injection (FI) has been shown to be an effective approach to assessing the dependability of software systems. To determine the impact of faults injected during FI, a given...
Matthew Leeke, Arshad Jhumka
122
Voted
ICASSP
2011
IEEE
14 years 8 months ago
A novel tracking analysis of the Normalized Least Mean Fourth algorithm
In this work, the tracking analysis of the Normalized Least Mean Fourth (NLMF) algorithm is investigated for a random walk channel under very weak assumptions. The novelty of this...
Muhammad Moinuddin, Azzedine Zerguine
134
Voted
BMCBI
2007
95views more  BMCBI 2007»
15 years 4 months ago
ZPS: visualization of recent adaptive evolution of proteins
Background: Detection of adaptive amino acid changes in proteins under recent short-term selection is of great interest for researchers studying microevolutionary processes in mic...
Sujay Chattopadhyay, Daniel E. Dykhuizen, Evgeni V...