Sciweavers

634 search results - page 45 / 127
» Groundwork for Weak Analysis
Sort
View
113
Voted
ECSQARU
2007
Springer
15 years 9 months ago
Comparing Argumentation Semantics with Respect to Skepticism
Abstract. The issue of formalizing skepticism relations between argumentation semantics has been considered only recently in the literature. In this paper, we contribute to this ki...
Pietro Baroni, Massimiliano Giacomin
126
Voted
ICMCS
2006
IEEE
128views Multimedia» more  ICMCS 2006»
15 years 9 months ago
On the Security of Multimedia Encryption Schemes Based on Multiple Huffman Table (MHT)
This paper addresses the security issues of the multimedia encryption schemes based on multiple Huffman table (MHT). A detailed analysis of known-plaintext attack is presented to ...
Jiantao Zhou, Zhiqin Liang, Yan Chen, Oscar C. Au
148
Voted
CHES
2005
Springer
117views Cryptology» more  CHES 2005»
15 years 9 months ago
DPA Leakage Models for CMOS Logic Circuits
In this paper, we propose new models for directly evaluating DPA leakage from logic information in CMOS circuits. These models are based on the transition probability for each gate...
Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
120
Voted
ATAL
2004
Springer
15 years 9 months ago
Non-Monotonic-Offers Bargaining Protocol
This paper discusses the strengths and weaknesses of non-monotonic-offers in alternating-offer bargaining protocol. It is commonly assumed that bargainers submit monotonic offers ...
Pinata Winoto, Gordon I. McCalla, Julita Vassileva
226
Voted
GCC
2004
Springer
15 years 9 months ago
Applying Grid Technologies to Distributed Data Mining
The Grid promises improvements in the effectiveness with which global businesses are managed, if it enables distributed expertise to be efficiently applied to the analysis of dist...
Alastair C. Hume, Ashley D. Lloyd, Terence M. Sloa...