Implementations of the Advanced Encryption Standard (AES), including hardware applications with limited resources (e.g., smart cards), may be vulnerable to āside-channel attacksā...
Breast cancer is one of the most common diseases among women. Content-based mammogram retrieval has been proposed to aid various medical procedures. To develop a content-based mam...
ā Association Rule Mining is a thoroughly studied problem in Data Mining. Its solution has been aimed for by approaches based on different strategies involving, for instance, the...
Frequent subtree mining has attracted a great deal of interest among the researchers due to its application in a wide variety of domains. Some of the domains include bio informati...
Abstract. A temporal interface for a software component is a ļ¬nite automaton that speciļ¬es the legal sequences of calls to functions that are provided by the component. We comp...