Sciweavers

1551 search results - page 22 / 311
» How Typical is the
Sort
View
FDTC
2011
Springer
267views Cryptology» more  FDTC 2011»
12 years 7 months ago
An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs
Abstract—The literature about fault analysis typically describes fault injection mechanisms, e.g. glitches and lasers, and cryptanalytic techniques to exploit faults based on som...
Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwh...
SEMWEB
2009
Springer
14 years 1 months ago
The OWLlink Protocol
A semantic application typically is a heterogenous system of interconnected components, most notably a reasoner. OWLlink is an implementation-neutral protocol for communication bet...
Thorsten Liebig, Marko Luther, Olaf Noppens
ESOP
2004
Springer
14 years 24 days ago
Adaptive Pattern Matching on Binary Data
Pattern matching is an important operation in functional programs. So far, pattern matching has been investigated in the context of structured terms. This paper presents an approac...
Per Gustafsson, Konstantinos F. Sagonas
AMFG
2003
IEEE
102views Biometrics» more  AMFG 2003»
14 years 21 days ago
PCA-Based Face Recognition in Infrared Imagery: Baseline and Comparative Studies
Techniques for face recognition generally fall into global and local approaches, with the principal component analysis (PCA) being the most prominent global approach. This paper u...
Xin Chen, Patrick J. Flynn, Kevin W. Bowyer
DAWAK
2003
Springer
14 years 19 days ago
CPM: A Cube Presentation Model for OLAP
On-Line Analytical Processing (OLAP) is a trend in database technology, based on the multidimensional view of data. In this paper we introduce the Cube Presentation Model (CPM), a ...
Andreas S. Maniatis, Panos Vassiliadis, Spiros Ski...