Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Professional designers and artists are quite cognizant of the rules that guide the design of effective color palettes, from both aesthetic and attention-guiding points of view. In ...
Lujin Wang, Joachim Giesen, Kevin T. McDonnell, ...
One of the techniques used to support decisions in uncertain environments is the Fuzzy TOPSIS method. However, from crisp data, this method considers only one fuzzy set in their a...
We present a way to add user's background knowledge to formal concept analysis. The type of background knowledge we deal with relates to relative importance of attributes in ...
Ontology-based data access is a powerful form of extending database technology, where a classical extensional database (EDB) is enhanced by an ontology that generates new intensio...