Sciweavers

749 search results - page 53 / 150
» Scenario based Analysis of Linear Computations
Sort
View
PEWASUN
2004
ACM
15 years 9 months ago
An M/MMGI/1/K queuing model for IEEE 802.11 ad hoc networks
An M/MMGI/1/K queuing model is developed for the analysis of IEEE 802.11 DCF using RTS/CTS. Results are based on arbitrary contention conditions, namely, collision probabilities, ...
Mustafa Özdemir, A. Bruce McDonald
ECCV
2006
Springer
16 years 5 months ago
Sampling Representative Examples for Dimensionality Reduction and Recognition - Bootstrap Bumping LDA
Abstract. We present a novel method for dimensionality reduction and recognition based on Linear Discriminant Analysis (LDA), which specifically deals with the Small Sample Size (S...
Hui Gao, James W. Davis
ET
2010
89views more  ET 2010»
15 years 2 months ago
On the Duality of Probing and Fault Attacks
In this work we investigate the problem of simultaneous privacy and integrity protection in cryptographic circuits. We consider a white-box scenario with a powerful, yet limited at...
Berndt M. Gammel, Stefan Mangard
ICPP
2000
IEEE
15 years 8 months ago
Evaluation of Loop Grouping Methods Based on Orthogonal Projection Spaces
This paper compares three similar loop-grouping methods. All methods are based on projecting the n-dimensional iteration space Jn onto a k-dimensional one, called the projected sp...
Ioannis Drositis, Georgios I. Goumas, Nectarios Ko...
DCC
2003
IEEE
16 years 3 months ago
On the Security of Digital Signature Schemes Based on Error-Correcting Codes
In this paper we discuss the security of digital signature schemes based on error? correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to e...
Sheng-Bo Xu, Jeroen Doumen, Henk C. A. van Tilborg