Sciweavers

741 search results - page 97 / 149
» An Analysis of Rule Evaluation Metrics
Sort
View
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
14 years 8 hour ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
ICAIL
2007
ACM
13 years 12 months ago
Mapping regulations to industry-specific taxonomies
For each industry, there exist many taxonomies that are intended for various applications. There are also multiple sources of regulations from different government agencies. Indus...
Chin Pang Cheng, Gloria T. Lau, Kincho H. Law
CORR
2002
Springer
90views Education» more  CORR 2002»
13 years 7 months ago
Mostly-Unsupervised Statistical Segmentation of Japanese Kanji Sequences
Given the lack of word delimiters in written Japanese, word segmentation is generally considered a crucial first step in processing Japanese texts. Typical Japanese segmentation a...
Rie Kubota Ando, Lillian Lee
VTC
2010
IEEE
145views Communications» more  VTC 2010»
13 years 6 months ago
Performance of Multihop Wireless Links over Generalized-K Fading Channels
— The performance of multihop links is studied in this contribution by both analysis and simulations, when communicating over Generalized-K (KG) fading channels. The performance ...
Jianfei Cao, Lie-Liang Yang, Zhangdui Zhong
ISPD
2012
ACM
252views Hardware» more  ISPD 2012»
12 years 3 months ago
Towards layout-friendly high-level synthesis
There are two prominent problems with technology scaling: increasing design complexity and more challenges with interconnect design, including routability. High-level synthesis ha...
Jason Cong, Bin Liu 0006, Guojie Luo, Raghu Prabha...