Sciweavers

11182 search results - page 2099 / 2237
» Shape Analysis of Sets
Sort
View
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
EMSOFT
2009
Springer
14 years 4 months ago
Handling mixed-criticality in SoC-based real-time embedded systems
System-on-Chip (SoC) is a promising paradigm to implement safety-critical embedded systems, but it poses significant challenges from a design and verification point of view. In ...
Rodolfo Pellizzoni, Patrick O'Neil Meredith, Min-Y...
ESWS
2009
Springer
14 years 4 months ago
SCOVO: Using Statistics on the Web of Data
Statistical data is present everywhere—from governmental bodies to economics, from life-science to industry. With the rise of the Web of Data, the need for sharing, accessing, an...
Michael Hausenblas, Wolfgang Halb, Yves Raimond, L...
FC
2009
Springer
104views Cryptology» more  FC 2009»
14 years 4 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
GECCO
2009
Springer
128views Optimization» more  GECCO 2009»
14 years 4 months ago
Neural network ensembles for time series forecasting
This work provides an analysis of using the evolutionary algorithm EPNet to create ensembles of artificial neural networks to solve a range of forecasting tasks. Several previous...
Victor M. Landassuri-Moreno, John A. Bullinaria
« Prev « First page 2099 / 2237 Last » Next »