Sciweavers

1120 search results - page 178 / 224
» Eager Markov Chains
Sort
View
ICTAC
2005
Springer
14 years 4 months ago
Stochastic Analysis of Graph Transformation Systems: A Case Study in P2P Networks
In distributed and mobile systems with volatile bandwidth and fragile connectivity, non-functional aspects like performance and reliability become more and more important. To forma...
Reiko Heckel
WINE
2005
Springer
143views Economy» more  WINE 2005»
14 years 4 months ago
An Analysis of Search Engine Switching Behavior Using Click Streams
In this paper, we propose a simple framework to characterize the switching behavior between search engines based on click streams. We segment users into a number of categories bas...
Yun-Fang Juan, Chi-Chao Chang
AMAI
2004
Springer
14 years 4 months ago
Bayesian Model Averaging Across Model Spaces via Compact Encoding
Bayesian Model Averaging (BMA) is well known for improving predictive accuracy by averaging inferences over all models in the model space. However, Markov chain Monte Carlo (MCMC)...
Ke Yin, Ian Davidson
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
14 years 4 months ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...
ESORICS
2004
Springer
14 years 4 months ago
On the Role of Key Schedules in Attacks on Iterated Ciphers
This paper considers iterated ciphers and their resistance against linear and differential cryptanalysis. In the theory of these attacks one assumes independence of the round keys...
Lars R. Knudsen, John Erik Mathiassen