Sciweavers

170 search results - page 11 / 34
» A Comparative Analysis of Dependence Testing Mechanisms
Sort
View
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
14 years 1 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
AOSD
2009
ACM
13 years 11 months ago
Semantic vs. syntactic compositions in aspect-oriented requirements engineering: an empirical study
Most current aspect composition mechanisms rely on syntactic references to the base modules or wildcard mechanisms quantifying over such syntactic references in pointcut expressio...
Ruzanna Chitchyan, Phil Greenwood, Américo ...
GECCO
2007
Springer
200views Optimization» more  GECCO 2007»
14 years 1 months ago
Performance analysis of niching algorithms based on derandomized-ES variants
A survey of niching algorithms, based on 5 variants of derandomized Evolution Strategies (ES), is introduced. This set of niching algorithms, ranging from the very first derandom...
Ofer M. Shir, Thomas Bäck
CSDA
2007
105views more  CSDA 2007»
13 years 7 months ago
Calculation of simplicial depth estimators for polynomial regression with applications
A fast algorithm for calculating the simplicial depth of a single parameter vector of a polynomial regression model is derived. Additionally, an algorithm for calculating the para...
R. Wellmann, S. Katina, Ch. H. Müller
BMCBI
2005
302views more  BMCBI 2005»
13 years 7 months ago
CGHPRO - A comprehensive data analysis tool for array CGH
Background: Array CGH (Comparative Genomic Hybridisation) is a molecular cytogenetic technique for the genome wide detection of chromosomal imbalances. It is based on the cohybrid...
Wei Chen, Fikret Erdogan, H.-Hilger Ropers, Steffe...