Sciweavers

1031 search results - page 107 / 207
» Broadcasting with Selective Reduction
Sort
View
ICPR
2008
IEEE
14 years 4 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
ISQED
2008
IEEE
150views Hardware» more  ISQED 2008»
14 years 4 months ago
Fundamental Data Retention Limits in SRAM Standby Experimental Results
SRAM leakage power dominates the total power of low duty-cycle applications, e.g., sensor nodes. Accordingly, leakage power reduction during data-retention in SRAM standby is ofte...
Animesh Kumar, Huifang Qin, Prakash Ishwar, Jan M....
GECCO
2007
Springer
168views Optimization» more  GECCO 2007»
14 years 4 months ago
Sex and death: towards biologically inspired heuristics for constraint handling
Constrained continuous optimization is still an interesting field of research. Many heuristics have been proposed in the last decade. Most of them are based on penalty functions....
Oliver Kramer, Stephan Brügger, Dejan Lazovic
IMA
2005
Springer
71views Cryptology» more  IMA 2005»
14 years 3 months ago
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Abstract. The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi et al. and Vazirani and Vazirani, who proved independently that O(log...
Andrey Sidorenko, Berry Schoenmakers
ITC
2002
IEEE
72views Hardware» more  ITC 2002»
14 years 3 months ago
Test Point Insertion that Facilitates ATPG in Reducing Test Time and Data Volume
Efficient production testing is frequently hampered because current digital circuits require test sets which are too large. These test sets can be reduced significantly by means...
M. J. Geuzebroek, J. Th. van der Linden, A. J. van...