Sciweavers

452 search results - page 68 / 91
» Finding bugs is easy
Sort
View
CHES
2010
Springer
210views Cryptology» more  CHES 2010»
13 years 9 months ago
Flash Memory 'Bumping' Attacks
This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually s...
Sergei Skorobogatov
ASC
2010
13 years 8 months ago
Simplifying Particle Swarm Optimization
The general purpose optimization method known as Particle Swarm Optimization (PSO) has received much attention in past years, with many attempts to find the variant that performs ...
M. E. H. Pedersen, Andrew J. Chipperfield
CSDA
2008
110views more  CSDA 2008»
13 years 8 months ago
Computing and using residuals in time series models
The most often used approaches to obtaining and using residuals in applied work with time series models, are unified and documented with both partially-known and new features. Spe...
José Alberto Mauricio
CVIU
2008
188views more  CVIU 2008»
13 years 8 months ago
Learning function-based object classification from 3D imagery
We propose a novel scheme for using supervised learning for function-based classification of objects in 3D images. During the learning process, a generic multi-level hierarchical ...
Michael Pechuk, Octavian Soldea, Ehud Rivlin
DATAMINE
2008
219views more  DATAMINE 2008»
13 years 8 months ago
Correlating burst events on streaming stock market data
Abstract We address the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. We follow a two-step methodology: first we iden...
Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Phil...