Sciweavers

260 search results - page 48 / 52
» On the Logic Underlying Common Sense
Sort
View
AFRICACRYPT
2010
Springer
13 years 12 months ago
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
Abstract. This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X. Standaert et al. at Eurocrypt 2009. The analyses ...
M. Abdelaziz Elaabid, Sylvain Guilley
BMCBI
2010
151views more  BMCBI 2010»
13 years 8 months ago
Using diffusion distances for flexible molecular shape comparison
Background: Many molecules are flexible and undergo significant shape deformation as part of their function, and yet most existing molecular shape comparison (MSC) methods treat t...
Yu-Shen Liu, Qi Li, Guo-Qin Zheng, Karthik Ramani,...
CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 8 months ago
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Abstract: A Mobile Adhoc Network (manet) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination am...
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sud...
MIS
2008
Springer
149views Multimedia» more  MIS 2008»
13 years 8 months ago
Home-Explorer: Ontology-based physical artifact search and hidden object detection system
A new system named Home-Explorer that searches and finds physical artifacts in a smart indoor environment is proposed. The view on which it is based is artifact-centered and uses s...
Bin Guo, Satoru Satake, Michita Imai
TSP
2008
151views more  TSP 2008»
13 years 8 months ago
Reduce and Boost: Recovering Arbitrary Sets of Jointly Sparse Vectors
The rapid developing area of compressed sensing suggests that a sparse vector lying in a high dimensional space can be accurately and efficiently recovered from only a small set of...
Moshe Mishali, Yonina C. Eldar