Sciweavers

126 search results - page 19 / 26
» Power Analysis of FPGAs: How Practical is the Attack
Sort
View
DCOSS
2010
Springer
13 years 8 months ago
Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges
Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wid...
Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen
ICDM
2009
IEEE
168views Data Mining» more  ICDM 2009»
14 years 1 months ago
Bi-relational Network Analysis Using a Fast Random Walk with Restart
—Identification of nodes relevant to a given node in a relational network is a basic problem in network analysis with great practical importance. Most existing network analysis ...
Jing Xia, Doina Caragea, William H. Hsu
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
14 years 5 days ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
PDP
2007
IEEE
14 years 1 months ago
Monitoring and Analysis Framework for Grid Middleware
As the use of complex grid middleware becomes widespread and more facilites are offered by these pieces of software, distributed Grid applications are becoming more and more popul...
Ramon Nou, Ferran Julià, David Carrera, Kev...
ICCV
2003
IEEE
14 years 3 hour ago
SVM-based Nonparametric Discriminant Analysis, An Application to Face Detection
Detecting the dominant normal directions to the decision surface is an established technique for feature selection in high dimensional classification problems. Several approaches...
Rik Fransens, Jan De Prins, Luc J. Van Gool