Sciweavers

7200 search results - page 30 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
TOMS
2010
75views more  TOMS 2010»
13 years 7 months ago
Computing correctly rounded integer powers in floating-point arithmetic
Peter Kornerup, Christoph Quirin Lauter, Vincent L...
CISS
2010
IEEE
13 years 9 days ago
Limiting false data attacks on power system state estimation
Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...
CCS
2011
ACM
12 years 8 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...
INFOCOM
2012
IEEE
11 years 11 months ago
Jointly optimal bit loading, channel pairing and power allocation for multi-channel relaying
Abstract—We aim to enhance the end-to-end rate of a general dual-hop relay network with multiple channels and finite modulation formats, by jointly optimizing channel pairing, p...
Mahdi Hajiaghayi, Min Dong, Ben Liang