Sciweavers

384 search results - page 68 / 77
» Trust as dependence: a logical approach
Sort
View
CHES
2008
Springer
260views Cryptology» more  CHES 2008»
13 years 10 months ago
Mutual Information Analysis
We propose a generic information-theoretic distinguisher for differential side-channel analysis. Our model of side-channel leakage is a refinement of the one given by Standaert et ...
Benedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart ...
ECAI
2008
Springer
13 years 9 months ago
Belief revision with reinforcement learning for interactive object recognition
From a conceptual point of view, belief revision and learning are quite similar. Both methods change the belief state of an intelligent agent by processing incoming information. Ho...
Thomas Leopold, Gabriele Kern-Isberner, Gabriele P...
FLAIRS
2004
13 years 9 months ago
Highway Vehicle Classification by Probabilistic Neural Networks
The Federal Highway Administration (FHWA) Office of Highway Planning requires states to furnish vehicle classification data as part of the Highway Performance Monitoring Systems (...
Valerian Kwigizile, Majura F. Selekwa, Renatus N. ...
ISSA
2004
13 years 9 months ago
High Data Rate 8-Bit Crypto Processor
This paper describes a high data rate 8-bit Crypto Processor based on Advanced Encryption Standard (Rijndael algorithm). Though the algorithm requires 32-bit wide data path but ou...
Sheikh Muhammad Farhan
AAAI
2010
13 years 9 months ago
Reasoning about Imperfect Information Games in the Epistemic Situation Calculus
Approaches to reasoning about knowledge in imperfect information games typically involve an exhaustive description of the game, the dynamics characterized by a tree and the incomp...
Vaishak Belle, Gerhard Lakemeyer