Sciweavers

1640 search results - page 296 / 328
» Deriving Private Information from Randomized Data
Sort
View
AWIC
2003
Springer
14 years 1 months ago
Web Page Classification: A Soft Computing Approach
The Internet makes it possible to share and manipulate a vast quantity of information efficiently and effectively, but the rapid and chaotic growth experienced by the Net has gener...
Angela Ribeiro, Víctor Fresno, Maria C. Gar...
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
14 years 1 months ago
Multi-channel Attacks
We introduce multi-channel attacks, i.e., side-channel attacks which utilize multiple side-channels such as power and EM simultaneously. We propose an adversarial model which combi...
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi
CDC
2009
IEEE
179views Control Systems» more  CDC 2009»
14 years 1 months ago
Bayesian network approach to understand regulation of biological processes in cyanobacteria
— Bayesian networks have extensively been used in numerous fields including artificial intelligence, decision theory and control. Its ability to utilize noisy and missing data ...
Thanura R. Elvitigala, Abhay K. Singh, Himadri B. ...
ICSM
1999
IEEE
14 years 28 days ago
Building Documentation Generators
In order to maintain the consistency between sources and documentation, while at the same time providing documentation at the design level, it is necessary to generate documentati...
Arie van Deursen, Tobias Kuipers
GIS
1999
ACM
14 years 28 days ago
Specifying Analysis Patterns for Geographic Databases on the Basis of a Conceptual Framework
Frameworks and Patterns are important instruments that enable the reuse of successful software solutions in recurrent problems. Geographic information systems, on the other hand, ...
Jugurta Lisboa Filho, Cirano Iochpe