Sciweavers

972 search results - page 75 / 195
» presence 2007
Sort
View
CCS
2007
ACM
15 years 6 months ago
Yet another MicroArchitectural Attack: : exploiting I-Cache
Abstract. MicroArchitectural Attacks (MA), which can be considered as a special form of SideChannel Analysis, exploit microarchitectural functionalities of processor implementation...
Onur Aciiçmez
CIE
2007
Springer
15 years 6 months ago
Input-Dependence in Function-Learning
In the standard model of inductive inference, a learner gets as input the graph of a function, and has to discover (in the limit) a program for the function. In this paper, we cons...
Sanjay Jain, Eric Martin, Frank Stephan
CMSB
2007
Springer
15 years 6 months ago
Reconstructing Metabolic Pathways by Bidirectional Chemical Search
Abstract. One of the main challenges in systems biology is the establishment of the metabolome: a catalogue of the metabolites and biochemical reactions present in a specific orga...
Liliana Félix, Francesc Rosselló, Ga...
CRYPTO
2007
Springer
116views Cryptology» more  CRYPTO 2007»
15 years 6 months ago
Random Oracles and Auxiliary Input
We introduce a variant of the random oracle model where oracle-dependent auxiliary input is allowed. In this setting, the adversary gets an auxiliary input that can contain informa...
Dominique Unruh
ECAL
2007
Springer
15 years 6 months ago
Minimal Agency Detection of Embodied Agents
Agency detection is studied in a simple simulated model with embodied agents. Psychological experiments such as double TV-monitor experiments and perceptual crossing show the centr...
Hiroyuki Iizuka, Ezequiel A. Di Paolo