Sciweavers

221 search results - page 17 / 45
» The Effects of Multiple Algorithms in the Advanced Encryptio...
Sort
View
CHES
2006
Springer
188views Cryptology» more  CHES 2006»
14 years 11 days ago
A Generalized Method of Differential Fault Attack Against AES Cryptosystem
Abstract. In this paper we describe two differential fault attack techniques against Advanced Encryption Standard (AES). We propose two models for fault occurrence; we could find a...
Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud...
BROADNETS
2007
IEEE
14 years 3 months ago
Fair bandwidth allocation framework for heterogeneous multi-radio Wireless Mesh Networks
Abstract—To reap the benefits of advances in wireless technologies as well as provide backward compatibility with current investments, future wireless routers that constitute th...
Shree Raman, Aura Ganz, Ramgopal R. Mettu
PKDD
2001
Springer
104views Data Mining» more  PKDD 2001»
14 years 1 months ago
Data Reduction Using Multiple Models Integration
Large amount of available information does not necessarily imply that induction algorithms must use all this information. Samples often provide the same accuracy with less computat...
Aleksandar Lazarevic, Zoran Obradovic
ECIR
2006
Springer
13 years 10 months ago
An Efficient Computation of the Multiple-Bernoulli Language Model
Abstract. The Multiple Bernoulli (MB) Language Model has been generally considered too computationally expensive for practical purposes and superseded by the more efficient multino...
Leif Azzopardi, David E. Losada
KDD
2004
ACM
164views Data Mining» more  KDD 2004»
14 years 9 months ago
Ordering patterns by combining opinions from multiple sources
Pattern ordering is an important task in data mining because the number of patterns extracted by standard data mining algorithms often exceeds our capacity to manually analyze the...
Pang-Ning Tan, Rong Jin