Sciweavers

381 search results - page 49 / 77
» Establishing Logical Rules from Empirical Data
Sort
View
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
VIS
2008
IEEE
172views Visualization» more  VIS 2008»
14 years 9 months ago
Color Design for Illustrative Visualization
Professional designers and artists are quite cognizant of the rules that guide the design of effective color palettes, from both aesthetic and attention-guiding points of view. In ...
Lujin Wang, Joachim Giesen, Kevin T. McDonnell, ...
CLEIEJ
2010
13 years 5 months ago
Fuzzy Systems for Multicriteria Decision Making
One of the techniques used to support decisions in uncertain environments is the Fuzzy TOPSIS method. However, from crisp data, this method considers only one fuzzy set in their a...
Fabio J. J. Santos, Heloisa A. Camargo
SAC
2008
ACM
13 years 7 months ago
Adding background knowledge to formal concept analysis via attribute dependency formulas
We present a way to add user's background knowledge to formal concept analysis. The type of background knowledge we deal with relates to relative importance of attributes in ...
Radim Belohlávek, Vilém Vychodil
PVLDB
2010
151views more  PVLDB 2010»
13 years 6 months ago
Advanced Processing for Ontological Queries
Ontology-based data access is a powerful form of extending database technology, where a classical extensional database (EDB) is enhanced by an ontology that generates new intensio...
Andrea Calì, Georg Gottlob, Andreas Pieris