Sciweavers

470 search results - page 37 / 94
» Using Unknown Word Techniques to Learn Known Words
Sort
View
CHES
2011
Springer
240views Cryptology» more  CHES 2011»
12 years 9 months ago
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightwe...
Meng-Day (Mandel) Yu, David M'Raïhi, Richard ...
ACSAC
2007
IEEE
14 years 3 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...
EDM
2008
93views Data Mining» more  EDM 2008»
13 years 10 months ago
A Preliminary Analysis of the Logged Questions that Students Ask in Introductory Computer Science
Asking questions is widely believed to contribute to student learning, but little is known about the questions that students ask or how to exploit them in tutorial interventions to...
Cecily Heiner
HCW
1999
IEEE
14 years 1 months ago
Multiple Cost Optimization for Task Assignment in Heterogeneous Computing Systems Using Learning Automata
A framework for task assignment in heterogeneous computing systems is presented in this work. The framework is based on a learning automata model. The proposed model can be used f...
Raju D. Venkataramana, N. Ranganathan
ECCV
2010
Springer
14 years 1 months ago
A Robust and Scalable Approach to Face Identification
The problem of face identification has received significant attention over the years. For a given probe face, the goal of face identification is to match this unknown face against ...