Sciweavers

616 search results - page 78 / 124
» Decoding One Out of Many
Sort
View
SADM
2011
13 years 3 months ago
Trellis display for modeling data from designed experiments
Abstract: Visualizing data by graphing a response against certain factors, and conditioning on other factors, has arisen independently in many contexts. One is the interaction plot...
Montserrat Fuentes, Bowei Xi, William S. Cleveland
JDCTA
2010
148views more  JDCTA 2010»
13 years 3 months ago
Web Services Supervision System Based on Jade
Web service technology is one of the trend technologies in computer science now, and recently with the rapid growth of web services deployed with the same functionality, many rese...
Ahmed Sallam, Zhiyong Li, Shaimaa Hassan
AIPS
2011
13 years 3 days ago
Searching for Plans with Carefully Designed Probes
We define a probe to be a single action sequence computed greedily from a given state that either terminates in the goal or fails. We show that by designing these probes carefull...
Nir Lipovetzky, Hector Geffner
JOC
2011
104views more  JOC 2011»
12 years 11 months ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
12 years 8 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert