Sciweavers

761 search results - page 126 / 153
» Metadata Principles and Practicalities
Sort
View
JDCTA
2010
175views more  JDCTA 2010»
14 years 9 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
CORR
2011
Springer
185views Education» more  CORR 2011»
14 years 6 months ago
Distributed SIR-Aware Scheduling in Large-Scale Wireless Networks
Opportunistic scheduling and routing can in principle greatly increase the throughput of decentralized wireless networks, but to be practical such algorithms must do so with small...
Chun-Hung Liu, Jeffrey G. Andrews
SDM
2011
SIAM
242views Data Mining» more  SDM 2011»
14 years 5 months ago
Fast Algorithms for Finding Extremal Sets
Identifying the extremal (minimal and maximal) sets from a collection of sets is an important subproblem in the areas of data-mining and satisfiability checking. For example, ext...
Roberto J. Bayardo, Biswanath Panda
CSFW
2011
IEEE
14 years 2 months ago
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection
Abstract—Audit mechanisms are essential for privacy protection in permissive access control regimes, such as in hospitals where denying legitimate access requests can adversely a...
Jeremiah Blocki, Nicolas Christin, Anupam Datta, A...
155
Voted
DSN
2011
IEEE
14 years 2 months ago
Approximate analysis of blocking queueing networks with temporal dependence
—In this paper we extend the class of MAP queueing networks to include blocking models, which are useful to describe the performance of service instances which have a limited con...
Vittoria de Nitto Persone, Giuliano Casale, Evgeni...