Sciweavers

12264 search results - page 46 / 2453
» Analysis of the rubberband algorithm
Sort
View
TKDE
2010
159views more  TKDE 2010»
13 years 6 months ago
The Tiled Bitmap Forensic Analysis Algorithm
— Tampering of a database can be detected through the use of cryptographically-strong hash functions. Subsequently-applied forensic analysis algorithms can help determine when, w...
Kyriacos E. Pavlou, Richard T. Snodgrass
ENTCS
2008
68views more  ENTCS 2008»
13 years 7 months ago
The Reach-and-Evolve Algorithm for Reachability Analysis of Nonlinear Dynamical Systems
This paper introduces a new algorithm dedicated to the rigorous reachability analysis of nonlinear dynamical systems. The algorithm is initially presented in the context of discre...
Pieter Collins, Alexandre Goldsztejn
IJNSEC
2006
80views more  IJNSEC 2006»
13 years 7 months ago
Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices
Side channel analysis is a technique that enables the adversary to benefit from information leakages occurring due to the implementation of encryption algorithms on
Dimitrios L. Delivasilis, Sokratis K. Katsikas
CASCON
1996
89views Education» more  CASCON 1996»
13 years 9 months ago
A comparison of algorithms for interprocedural class analysis
Message passing overhead is often a substantial source of runtime overhead in object-oriented applications. To combat this performance problem, a number of techniques have been de...
David Grove
DAGSTUHL
1996
13 years 9 months ago
Competitive Analysis of Distributed Algorithms
Abstract. Most applications of competitive analysis have involved online problems where a candidate on-line algorithm must compete on some input sequence against an optimal o -line...
James Aspnes