In this paper a multistage fuzzy controller is designed and implemented on the ball and beam system which is a well-known benchmark in the control area because of its nonlinear, u...
Abstract. We investigate three side channel attacks on ABSG, a variant of irregularly decimated generators (IDG). The three attacks are timing analysis, phase-shift fault analysis ...
Anonymity protocols are a privacy-enhancing technology for Internet-based communication. Two important characteristics of anonymity protocols are the strength of anonymity provide...
Andreas Hirt, Michael J. Jacobson Jr., Carey L. Wi...
: For a transaction database, a frequent itemset is an itemset included in at least a specified number of transactions. A frequent itemset P is maximal if P is included in no other...
A tight integration of Mitchell's version space algorithm with Agrawal et al.'s Apriori algorithm is presented. The algorithm can be used to generate patterns that satis...