Sciweavers

2283 search results - page 311 / 457
» Bounds of Graph Characteristics
Sort
View
INDOCRYPT
2005
Springer
15 years 9 months ago
On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks
Prouff has introduced recently, at FSE 2005, the notion of transparency order of S-boxes. This new characteristic is related to the ability of an S-box, used in a cryptosystem in ...
Claude Carlet
IDEAL
2004
Springer
15 years 9 months ago
Exploiting Safety Constraints in Fuzzy Self-organising Maps for Safety Critical Applications
This paper defines a constrained Artificial Neural Network (ANN) that can be employed for highly-dependable roles in safety critical applications. The derived model is based upon t...
Zeshan Kurd, Tim P. Kelly, Jim Austin
DEXAW
2002
IEEE
79views Database» more  DEXAW 2002»
15 years 9 months ago
Understanding the Behavior of the Conflict-Rate Metric in Optimistic Peer Replication
Optimistic replication of data is a widely used tool for mobile environments, but the behavior of concurrent conflicting updates caused by the relaxed consistency model is poorly ...
An-I Wang, Peter L. Reiher, Rajive Bagrodia, Geoff...
LATA
2009
Springer
15 years 8 months ago
On Parallel Communicating Grammar Systems and Correctness Preserving Restarting Automata
Abstract. This paper contributes to the study of Freely Rewriting Restarting Automata (FRR-automata) and Parallel Communicating Grammar Systems (PCGS) as formalizations of the ling...
Dana Pardubská, Martin Plátek, Fried...
128
Voted
CAIP
2001
Springer
126views Image Analysis» more  CAIP 2001»
15 years 8 months ago
A Technique for Segmentation of Gurmukhi Text
This paper describes a technique for text segmentation of machine printed Gurmukhi script documents. Research in the field of segmentation of Gurmukhi script faces major problems m...
G. S. Lehal, Chandan Singh