Sciweavers

2283 search results - page 311 / 457
» Bounds of Graph Characteristics
Sort
View
INDOCRYPT
2005
Springer
14 years 1 months ago
On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks
Prouff has introduced recently, at FSE 2005, the notion of transparency order of S-boxes. This new characteristic is related to the ability of an S-box, used in a cryptosystem in ...
Claude Carlet
IDEAL
2004
Springer
14 years 1 months ago
Exploiting Safety Constraints in Fuzzy Self-organising Maps for Safety Critical Applications
This paper defines a constrained Artificial Neural Network (ANN) that can be employed for highly-dependable roles in safety critical applications. The derived model is based upon t...
Zeshan Kurd, Tim P. Kelly, Jim Austin
DEXAW
2002
IEEE
79views Database» more  DEXAW 2002»
14 years 1 months ago
Understanding the Behavior of the Conflict-Rate Metric in Optimistic Peer Replication
Optimistic replication of data is a widely used tool for mobile environments, but the behavior of concurrent conflicting updates caused by the relaxed consistency model is poorly ...
An-I Wang, Peter L. Reiher, Rajive Bagrodia, Geoff...
LATA
2009
Springer
14 years 22 days ago
On Parallel Communicating Grammar Systems and Correctness Preserving Restarting Automata
Abstract. This paper contributes to the study of Freely Rewriting Restarting Automata (FRR-automata) and Parallel Communicating Grammar Systems (PCGS) as formalizations of the ling...
Dana Pardubská, Martin Plátek, Fried...
CAIP
2001
Springer
126views Image Analysis» more  CAIP 2001»
14 years 20 days ago
A Technique for Segmentation of Gurmukhi Text
This paper describes a technique for text segmentation of machine printed Gurmukhi script documents. Research in the field of segmentation of Gurmukhi script faces major problems m...
G. S. Lehal, Chandan Singh