With the advent of large scale heterogeneous environments, there is a need for matching and scheduling algorithms which can allow multiple DAG-structured applications to share the...
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Speaker identification and verification systems have a poor performance when model training is done in one language while the testing is done in another. This situation is not unu...
Thecurrent frameworkfor constructing intelligent tutoring systems(ITS) is to use psychological/pedagogical theories of learning, and encode this knowledgeinto the tutor. However,t...
—The precision-recall curve (PRC) has become a widespread conceptual basis for assessing classification performance. The curve relates the positive predictive value of a classi...
Kay Henning Brodersen, Cheng Soon Ong, Klaas Enno ...