Sciweavers

885 search results - page 132 / 177
» Random Matrices in Data Analysis
Sort
View
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 2 months ago
A Very Compact "Perfectly Masked" S-Box for AES
Implementations of the Advanced Encryption Standard (AES), including hardware applications with limited resources (e.g., smart cards), may be vulnerable to ā€œside-channel attacksā...
D. Canright, Lejla Batina
MINENET
2006
ACM
14 years 1 months ago
SVM learning of IP address structure for latency prediction
We examine the ability to exploit the hierarchical structure of Internet addresses in order to endow network agents with predictive capabilities. Speciļ¬cally, we consider Suppor...
Robert Beverly, Karen R. Sollins, Arthur Berger
SIGMOD
2006
ACM
121views Database» more  SIGMOD 2006»
14 years 1 months ago
Derby/S: a DBMS for sample-based query answering
Although approximate query processing is a prominent way to cope with the requirements of data analysis applications, current database systems do not provide integrated and compre...
Anja Klein, Rainer Gemulla, Philipp Rösch, Wo...
EMMCVPR
2005
Springer
14 years 1 months ago
Exploiting Inference for Approximate Parameter Learning in Discriminative Fields: An Empirical Study
Abstract. Estimation of parameters of random ļ¬eld models from labeled training data is crucial for their good performance in many image analysis applications. In this paper, we p...
Sanjiv Kumar, Jonas August, Martial Hebert
DSN
2003
IEEE
14 years 1 months ago
Characterization of Linux Kernel Behavior under Errors
This paper describes an experimental study of Linux kernel behavior in the presence of errors that impact the instruction stream of the kernel code. Extensive error injection exper...
Weining Gu, Zbigniew Kalbarczyk, Ravishankar K. Iy...