Sciweavers

3719 search results - page 57 / 744
» order 2010
Sort
View
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
13 years 11 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
ICPR
2010
IEEE
13 years 10 months ago
Impact of Vector Ordering Strategies on Morphological Unmixing of Remotely Sensed Hyperspectral Images
Hyperspectral imaging is a new technique in remote sensing that generates hundreds of images, corresponding to different wavelength channels, for the same area on the surface of t...
Antonio Plaza, Javier Plaza
FOCM
2010
90views more  FOCM 2010»
13 years 8 months ago
Convergence of a Time Discretisation for Doubly Nonlinear Evolution Equations of Second Order
The convergence of a time discretisation with variable time steps is shown for a class of doubly nonlinear evolution equations of second order. This also proves existence of a weak...
Etienne Emmrich, Mechthild Thalhammer
JCNS
2010
100views more  JCNS 2010»
13 years 8 months ago
Morphologically accurate reduced order modeling of spiking neurons
Accurately simulating neurons with realistic morphological structure and synaptic inputs requires the solution of large systems of nonlinear ordinary differential equations. We ap...
Anthony R. Kellems, Saifon Chaturantabut, Danny C....
LATA
2010
Springer
13 years 8 months ago
Language-Based Comparison of Petri Nets with Black Tokens, Pure Names and Ordered Data
We apply language theory to compare the expressive power of models that extend Petri nets with features like colored tokens and/or whole place operations. Specifically, we conside...
Fernando Rosa Velardo, Giorgio Delzanno