Sciweavers

10213 search results - page 408 / 2043
» An Experimental Analysis of Parallel
Sort
View
ISI
2005
Springer
15 years 10 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang
117
Voted
ACRI
2004
Springer
15 years 10 months ago
SAT-Based Analysis of Cellular Automata
Abstract. Cellular Automata are a powerful formal model for describing physical and computational processes. Qualitative analysis of Cellular Automata is in general a hard problem....
Massimo D'Antonio, Giorgio Delzanno
SPATIALCOGNITION
2004
Springer
15 years 10 months ago
Sketch Map Analysis Using GIS Buffer Operation
We developed a method to analyze sketch maps by GIS, and applied it to an actual case study. We found that analysis using buffer operation was more effective for sketch map analyse...
Kohei Okamoto, Kei-ichi Okunuki, Toshibumi Takai
CHES
2000
Springer
204views Cryptology» more  CHES 2000»
15 years 9 months ago
Using Second-Order Power Analysis to Attack DPA Resistant Software
Under a simple power leakage model based on Hamming weight, a software implementation of a data-whitening routine is shown to be vulnerable to a first-order Differential Power Anal...
Thomas S. Messerges
ICRA
1999
IEEE
136views Robotics» more  ICRA 1999»
15 years 9 months ago
Analysis and Design of Non-Time Based Motion Controller for Mobile Robots
A new design method for non-time based tracking controller of mobile robots is presented. The new design method converts a controller designed by traditional time-based approaches ...
Wei Kang, Ning Xi, Jindong Tan