Sciweavers

1265 search results - page 56 / 253
» Finding the Key to a Synapse
Sort
View
CHES
2006
Springer
188views Cryptology» more  CHES 2006»
14 years 1 months ago
A Generalized Method of Differential Fault Attack Against AES Cryptosystem
Abstract. In this paper we describe two differential fault attack techniques against Advanced Encryption Standard (AES). We propose two models for fault occurrence; we could find a...
Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud...
ICIP
2002
IEEE
14 years 11 months ago
Effects of channel delays on underflow events of compressed video over the Internet
This paper presents an extensive statistical study and analysis of the effects of channel delays in the current (best-effort) Internet on underflow events in MPEG-4 video streamin...
Dmitri Loguinov, Hayder Radha
WWW
2007
ACM
14 years 10 months ago
Investigating behavioral variability in web search
Understanding the extent to which people'ssearch behaviors differ in terms of the interaction flow and information targeted is important in designing interfaces to help World...
Ryen W. White, Steven M. Drucker
KDD
2008
ACM
121views Data Mining» more  KDD 2008»
14 years 10 months ago
Reconstructing chemical reaction networks: data mining meets system identification
We present an approach to reconstructing chemical reaction networks from time series measurements of the concentrations of the molecules involved. Our solution strategy combines t...
Yong Ju Cho, Naren Ramakrishnan, Yang Cao
KDD
2005
ACM
162views Data Mining» more  KDD 2005»
14 years 10 months ago
Discovering frequent topological structures from graph datasets
The problem of finding frequent patterns from graph-based datasets is an important one that finds applications in drug discovery, protein structure analysis, XML querying, and soc...
Ruoming Jin, Chao Wang, Dmitrii Polshakov, Sriniva...