Sciweavers

2763 search results - page 126 / 553
» The Dangerous 'All' in Specifications
Sort
View
ICPR
2010
IEEE
14 years 23 days ago
Pattern Recognition Using Functions of Multiple Instances
The Functions of Multiple Instances (FUMI) method for learning a target prototype from data points that are functions of target and non-target prototypes is introduced. In this pa...
Alina Zare, Paul Gader
FAST
2008
13 years 12 months ago
The RAID-6 Liberation Codes
The RAID-6 specification calls for a storage system with multiple storage devices to tolerate the failure of any two devices. Numerous erasure coding techniques have been develope...
James S. Plank
WSC
2008
13 years 12 months ago
PLCStudio: Simulation based PLC code verification
Proposed in this paper is the architecture of a PLC programming environment that enables a visual verification of PLC programs. The proposed architecture integrates a PLC program ...
Sang C. Park, Chang Mok Park, Gi-Nam Wang, Jonggeu...
CDC
2008
IEEE
149views Control Systems» more  CDC 2008»
13 years 11 months ago
Distributed computation under bit constraints
Abstract-- A network of nodes communicate via noisy channels. Each node has some real-valued initial measurement or message. The goal of each of the nodes is to acquire an estimate...
Ola Ayaso, Devavrat Shah, Munther A. Dahleh
CHES
2008
Springer
144views Cryptology» more  CHES 2008»
13 years 11 months ago
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
Abstract. This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate...
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Ak...