Sciweavers

3147 search results - page 96 / 630
» Statistically Hiding Sets
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
14 years 27 days ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
DAC
2004
ACM
14 years 10 months ago
STAC: statistical timing analysis with correlation
Current technology trends have led to the growing impact of both inter-die and intra-die process variations on circuit performance. While it is imperative to model parameter varia...
Jiayong Le, Xin Li, Lawrence T. Pileggi
GLVLSI
2006
IEEE
185views VLSI» more  GLVLSI 2006»
14 years 3 months ago
Application of fast SOCP based statistical sizing in the microprocessor design flow
In this paper we have applied statistical sizing in an industrial setting. Efficient implementation of the statistical sizing algorithm is achieved by utilizing a dedicated interi...
Murari Mani, Mahesh Sharma, Michael Orshansky
HICSS
2003
IEEE
93views Biometrics» more  HICSS 2003»
14 years 2 months ago
A General Method for Statistical Performance Evaluation
In the paper, we propose a general method for statistical performance evaluation. The method incorporates various statistical metrics and automatically selects an appropriate stat...
Longzhuang Li, Yi Shang, Wei Zhang, Hongchi Shi
CAIP
2003
Springer
222views Image Analysis» more  CAIP 2003»
14 years 2 months ago
Learning Statistical Structure for Object Detection
Abstract. Many classes of images exhibit sparse structuring of statistical dependency. Each variable has strong statistical dependency with a small number of other variables and ne...
Henry Schneiderman