Register files of microprocessors have often been cited as performance bottlenecks and significant consumers of energy. The robust and modular nature of quasi-delay insensitive (Q...
Abstract. This paper presents a rough set model for constraint-based multidimensional association rule mining. It first overviews the progress in constraintbased multi-dimensional ...
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
We propose a sequential randomized algorithm, which at each step concentrates on functions having both low risk and low variance with respect to the previous step prediction functi...
An analysis-by-synthesis framework for face recognition with variant pose, illumination and expression (PIE) is proposed in this paper. First, an efficient 2D-to-3D integrated fac...
Yuxiao Hu, Dalong Jiang, Shuicheng Yan, Lei Zhang,...