Sciweavers

1644 search results - page 184 / 329
» Finding Dominators in Practice
Sort
View
ASIACRYPT
2006
Springer
14 years 26 days ago
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensively studied in the literature over the last 25 years. These generators have the a...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
14 years 13 days ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...
AAAI
2008
13 years 11 months ago
Planning for Human-Robot Interaction Using Time-State Aggregated POMDPs
In order to interact successfully in social situations, a robot must be able to observe others' actions and base its own behavior on its beliefs about their intentions. Many ...
Frank Broz, Illah R. Nourbakhsh, Reid G. Simmons
BPM
2008
Springer
145views Business» more  BPM 2008»
13 years 11 months ago
Modularity in Process Models: Review and Effects
Abstract. The use of subprocesses in large process models is an important step in modeling practice to handle complexity. While there are several advantages attributed to such a mo...
Hajo A. Reijers, Jan Mendling
ACSW
2004
13 years 10 months ago
Experiences in Building a Tool for Navigating Association Rule Result Sets
Practical knowledge discovery is an iterative process. First, the experiences gained from one mining run are used to inform the parameter setting and the dataset and attribute sel...
Peter Fule, John F. Roddick