Sciweavers

165 search results - page 20 / 33
» Some Pairwise Balanced Designs
Sort
View
JDCTA
2010
175views more  JDCTA 2010»
13 years 2 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
EDBT
2008
ACM
166views Database» more  EDBT 2008»
14 years 7 months ago
OrthoCluster: a new tool for mining synteny blocks and applications in comparative genomics
By comparing genomes among both closely and distally related species, comparative genomics analysis characterizes structures and functions of different genomes in both conserved a...
Xinghuo Zeng, Matthew J. Nesbitt, Jian Pei, Ke Wan...
SPAA
2004
ACM
14 years 24 days ago
Lower bounds for graph embeddings and combinatorial preconditioners
Given a general graph G, a fundamental problem is to find a spanning tree H that best approximates G by some measure. Often this measure is some combination of the congestion and...
Gary L. Miller, Peter C. Richter
ACMACE
2006
ACM
14 years 1 months ago
Projecting tension in virtual environments through lighting
Interactive synthetic environments are currently used in a wide variety of applications, including video games, exposure therapy, education, and training. Their success in such do...
Magy Seif El-Nasr
CSREAEEE
2006
145views Business» more  CSREAEEE 2006»
13 years 8 months ago
e-Business Systems: Exploring Knowledge Prospect Domains (KPDs)
Research was conducted in the area of sustainable knowledge extraction from e-business systems and technologies. Differentiating approaches from three notable authors in the field...
Daniel Botha