Sciweavers

2827 search results - page 275 / 566
» Robustness of PSPACE-complete sets
Sort
View
DATE
2008
IEEE
121views Hardware» more  DATE 2008»
15 years 6 months ago
Constraint Refinement for Online Verifiable Cross-Layer System Adaptation
Adaptive resource management is critical to ensuring the quality of real-time distributed applications, particularly for energy-constrained mobile handheld devices. In this contex...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
EDCC
2008
Springer
15 years 6 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
ECIR
2008
Springer
15 years 5 months ago
Enhancing Relevance Models with Adaptive Passage Retrieval
Passage retrieval and pseudo relevance feedback/query expansion have been reported as two effective means for improving document retrieval in literature. Relevance models, while im...
Xiaoyan Li, Zhigang Zhu
NIPS
2007
15 years 5 months ago
Boosting Algorithms for Maximizing the Soft Margin
We present a novel boosting algorithm, called SoftBoost, designed for sets of binary labeled examples that are not necessarily separable by convex combinations of base hypotheses....
Manfred K. Warmuth, Karen A. Glocer, Gunnar Rä...
NIPS
2007
15 years 5 months ago
Selecting Observations against Adversarial Objectives
In many applications, one has to actively select among a set of expensive observations before making an informed decision. Often, we want to select observations which perform well...
Andreas Krause, H. Brendan McMahan, Carlos Guestri...