Sciweavers

3719 search results - page 55 / 744
» order 2010
Sort
View
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
14 years 4 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
RAID
2010
Springer
13 years 8 months ago
Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams
Network intrusion detection systems (NIDS) make extensive use of regular expressions as attack signatures. Internally, NIDS represent and operate these signatures using finite au...
Liu Yang, Rezwana Karim, Vinod Ganapathy, Randy Sm...
ASUNAM
2010
IEEE
13 years 9 months ago
Mining Interaction Behaviors for Email Reply Order Prediction
—In email networks, user behaviors affect the way emails are sent and replied. While knowing these user behaviors can help to create more intelligent email services, there has no...
Byung-Won On, Ee-Peng Lim, Jing Jiang, Amruta Pura...
ICPR
2010
IEEE
13 years 8 months ago
Multiple Kernel Learning with High Order Kernels
Previous Multiple Kernel Learning approaches (MKL) employ different kernels by their linear combination. Though some improvements have been achieved over methods using single kerne...
Shuhui Wang, Shuqiang Jiang, Qingming Huang, Qi Ti...
MOC
2010
13 years 4 months ago
Integral deferred correction methods constructed with high order Runge-Kutta integrators
Spectral deferred correction (SDC) methods for solving ordinary differential equations (ODEs) were introduced by Dutt, Greengard and Rokhlin [5]. It was shown in [5] that SDC metho...
Andrew J. Christlieb, Benjamin W. Ong, Jing-Mei Qi...