標(biāo)題: Titlebook: Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf; Part II Jerzy ?wi?tek,Leszek Borzemsk [打印本頁] 作者: controllers 時(shí)間: 2025-3-21 17:09
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf影響因子(影響力)
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf影響因子(影響力)學(xué)科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf網(wǎng)絡(luò)公開度
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf被引頻次
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf被引頻次學(xué)科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf年度引用
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf年度引用學(xué)科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf讀者反饋
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf讀者反饋學(xué)科排名
作者: AGATE 時(shí)間: 2025-3-21 21:46
existing solutions aiming at similar purposes, such as frequency-based filtering, it benefits from easier-to-exploit intuitions, applicability in contexts where low sampling rates make standard frequency analyses challenging, and the (theoretical) possibility to separate a signal source from a nois作者: Haphazard 時(shí)間: 2025-3-22 01:28 作者: Agronomy 時(shí)間: 2025-3-22 06:40 作者: 繼承人 時(shí)間: 2025-3-22 10:44
Peter ?arafín,Juraj Mi?ek,Ondrej Karpi?,Judith Molka-Danielsenacks extract decryption keys using a very low measurement bandwidth (a frequency band of less than 100?kHz around a carrier under 2?MHz) even when attacking multi-GHz CPUs..We demonstrate the attacks’ feasibility by extracting keys from GnuPG (unmodified ElGamal and non-blinded RSA), within seconds,作者: 颶風(fēng) 時(shí)間: 2025-3-22 16:26
Anna Derezińskaministic branch predictor behavior due to their key-dependent input sequences. We show that branch predictors can also leak information through the hardware performance monitors which are accessible by an adversary at the user-privilege level. This paper presents an iterative attack which target the作者: 壓迫 時(shí)間: 2025-3-22 19:15 作者: NOT 時(shí)間: 2025-3-23 00:17 作者: ECG769 時(shí)間: 2025-3-23 01:49
Viktor Vlasenko,S?awomir Stemplewski,Piotr Koczureoretical interest, they have recently gained attention because of their use in the design and proof of leakage-resilient primitives, such as stream ciphers and pseudorandom functions. However, for these proofs of leakage resilience to be meaningful in practice, it is important to instantiate and im作者: Palter 時(shí)間: 2025-3-23 07:13
Maria Drakaki,Yannis L. Karnavas,Ioannis D. Chasiotis,Panagiotis Tzionasgainst side-channel attacks. In this paper, we complement this work by analyzing an implementation of the AES S-box, in the DDSLL dual-rail logic style, using the same 65-nanometer technology. For this purpose, we first compare the performance results of the static CMOS and dual-rail S-boxes. We sho作者: 脊椎動(dòng)物 時(shí)間: 2025-3-23 13:32 作者: 獨(dú)裁政府 時(shí)間: 2025-3-23 17:18 作者: 發(fā)展 時(shí)間: 2025-3-23 19:07
Rafa? Wojszczykumber has only been deployed in software implementations of cryptographic algorithms and in the linear parts of their hardware counterparts. So far there is no hardware construction that achieves this lower bound if the function is nonlinear and the underlying logic gates can glitch. In this paper, 作者: 吞下 時(shí)間: 2025-3-23 23:11 作者: 輪流 時(shí)間: 2025-3-24 02:46
Adrian Andrzejewski,Kordian Kr?cisz,Mariusz Matusiak,Andrzej Romanowski,Laurent Baboutumber has only been deployed in software implementations of cryptographic algorithms and in the linear parts of their hardware counterparts. So far there is no hardware construction that achieves this lower bound if the function is nonlinear and the underlying logic gates can glitch. In this paper, 作者: LAPSE 時(shí)間: 2025-3-24 10:08
d – often even remotely. The fact that components that were hitherto purely mechanical, such as connections to the brakes, throttle, and steering wheel, have been computerized makes digital exploits life-threatening. Because of the interconnectedness of sensors, controllers and actuators, any compro作者: 舊病復(fù)發(fā) 時(shí)間: 2025-3-24 12:32 作者: 膽大 時(shí)間: 2025-3-24 17:36 作者: 寵愛 時(shí)間: 2025-3-24 21:07 作者: Eosinophils 時(shí)間: 2025-3-24 23:26
ck strategy consists in approximating the information leakages by Gaussian distributions. Nevertheless this approach suffers from the difficulty to deal with both the traces misalignment and the high dimensionality of the data. This forces the attacker to perform critical preprocessing phases, such 作者: Intractable 時(shí)間: 2025-3-25 03:38 作者: fallible 時(shí)間: 2025-3-25 07:54
Modified HALS Algorithm for Image Completion and Recommendation Systemem has important applications, especially in image processing and social sciences. In our approach, we focus on the problem of recovering missing pixels in images perturbed with impulse noise in a transmission channel as well as estimating unknown ratings in a recommendation system. For solving thes作者: 非秘密 時(shí)間: 2025-3-25 13:00 作者: flourish 時(shí)間: 2025-3-25 15:56
A Structure-Driven Process of Automated Refactoring to Design Patternss a process that automates this kind of refactoring. The approach is based on a structural code analysis aimed at design pattern relevance. The process consists of three main phases: code analysis, determination of a refactoring range, and realization of code restructuring. The latter is a complex c作者: erythema 時(shí)間: 2025-3-25 22:53
Modeling Autoreferential Relationships in Association-Oriented Database Metamodele other elements with the same type. The paper introduces modeling of autoreferential relationships in Association-Oriented Database Metamodel in regard to its semantic capabilities, i.e. freedom of defining multiplicity on both sides of relationships, connecting associations with each other and com作者: 博識 時(shí)間: 2025-3-26 01:22
Identification of Objects Based on Generalized Amplitude-Phase Images Statistical Modelsata arrays (semantic models) and statistical correlation analysis methods using the generalized discrete Hilbert transforms (DHT) – 2D Hilbert (Foucault) isotropic (HTI), anisotropic (HTA) and total transforms – AP-analysis (APA) to calculate the APIm. The identified objects are modeled with 3D airp作者: mucous-membrane 時(shí)間: 2025-3-26 08:18 作者: diskitis 時(shí)間: 2025-3-26 09:20
An Intelligent Multi-Agent System Framework for Fault Diagnosis of Squirrel-Cage Induction Motor Broto accurately identify faults in induction motors. Multi-agent systems (MAS) as a distributed AI method are efficient in representing intelligent manufacturing systems to achieve decision robustness. In this paper, an intelligent MAS is developed for the decision making in fault diagnosis of three-p作者: BET 時(shí)間: 2025-3-26 13:15
Performance Comparison of Neural Network Training Algorithms for Load Forecasting in Smart Gridsrids (SPG) the control system of the process should contain a subsystem of forecasting time series - load forecasting, as a parameter directly associated with voltage. The highest requirements applicate for the accuracy of short-term (day-week-month) and operational (within the current day) forecast作者: 冷淡周邊 時(shí)間: 2025-3-26 17:57
The Experiment with Quality Assessment Method Based on Strategy Design Pattern Exampleg design patterns. The aim of the article is to show the example of quality assessment method of the implementation of the strategy design pattern and benefits which are given by this method. The analysis of the results of method can help the leader of developer team in case of getting decision of t作者: CHANT 時(shí)間: 2025-3-26 23:04 作者: 外面 時(shí)間: 2025-3-27 03:11 作者: 切割 時(shí)間: 2025-3-27 07:25
Motion Repeatability of Tennis Forehand Preparation Phase Without the Ball Using Three Dimensional Deate the algorithms for calculating the motion parameters for the preparation phase of the forehand, such as: the position of the head of the tennis racket relative to the player’s body, the elbow angle (i.e. whether the arm is bent or straight) and the placement of the player’s feet towards the fro作者: 歡樂東方 時(shí)間: 2025-3-27 09:54
Towards Standardized Mizar Environments knowledge library, however, the harder it is to specify what is or should be relevant. Even with today’s size of the libraries available for various proof assistants, importing the whole library is not an option for practical performance reasons. On the other hand, too detailed import mechanisms ar作者: Processes 時(shí)間: 2025-3-27 16:03
Formalization of the Nominative Algorithmic Algebra in Mizaric algebras which is well suited for representing semantics and specifying properties of programs on complex data structures which interact with external environment in convenient and unified way. We describe formal definitions and formally proven and checked statements about the carrier sets and op作者: Semblance 時(shí)間: 2025-3-27 18:26
Jerzy ?wi?tek,Leszek Borzemski,Zofia WilimowskaPresents recent advances in Information Systems Architecture and Technology.Contains best papers presented at the 38th International Conference on Information Systems Architecture and Technology – ISA作者: 變形詞 時(shí)間: 2025-3-27 22:04
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/i/image/465479.jpg作者: MENT 時(shí)間: 2025-3-28 02:26
978-3-319-67228-1Springer International Publishing AG 2018作者: 寬度 時(shí)間: 2025-3-28 07:50
Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf978-3-319-67229-8Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: 成績上升 時(shí)間: 2025-3-28 13:07
https://doi.org/10.1007/978-3-319-67229-8Risk Management; Information Systems; Information Systems Architecture; Computer Networks; ISAT 2017作者: 代理人 時(shí)間: 2025-3-28 16:33 作者: 表否定 時(shí)間: 2025-3-28 21:23 作者: BLA 時(shí)間: 2025-3-29 00:15
Analysis of IMS/NGN Call Processing Performance Using Phase-Type Distributions Based on Experimental作者: Canary 時(shí)間: 2025-3-29 04:29
Information Systems Architecture and Technology: Proceedings of 38th International Conference on InfPart II作者: 松雞 時(shí)間: 2025-3-29 10:17
Conference proceedings 2018into topical parts:.?.Part I— includes discourses on topics including, but not limited to, Artificial Intelligence Methods, Knowledge Discovery and Data Mining, Big Data, Knowledge Discovery and Data Mining, Knowledge Based Management, Internet of Things, Cloud Computing and High Performance Computi作者: 高腳酒杯 時(shí)間: 2025-3-29 13:06 作者: 下垂 時(shí)間: 2025-3-29 15:51 作者: brassy 時(shí)間: 2025-3-29 20:14
Damian Raczyński,W?odzimierz Stanis?awskil library and comparisons with conventional circuits, including those with tower fields .. Consequently, we show that the proposed circuit achieves approximately 40?% higher efficiency in terms of area-time product than the conventional best . circuit excluding isomorphic mappings. We also demonstra作者: Narcissist 時(shí)間: 2025-3-30 03:52
Tomasz Sadowski,Rafa? Zdunekin the secret key, intermediate values occur with a special structure that causes observable fluctuations in the electromagnetic field. Through suitable signal processing and cryptanalysis, the bit patterns and eventually the whole secret key are recovered.作者: 迅速成長 時(shí)間: 2025-3-30 07:15
Peter ?arafín,Juraj Mi?ek,Ondrej Karpi?,Judith Molka-Danielsenin the secret key, intermediate values occur with a special structure that causes observable fluctuations in the electromagnetic field. Through suitable signal processing and cryptanalysis, the bit patterns and eventually the whole secret key are recovered.作者: Facet-Joints 時(shí)間: 2025-3-30 11:27 作者: 收養(yǎng) 時(shí)間: 2025-3-30 15:38
Marek Krótkiewicz,Marcin Jod?owiec combining mean traces and PCA) and evaluate their behaviour across an extensive set of distortions that we apply to representative trace data. Our results show that the profiled distinguishers are effective and robust to distortions to a surprising extent.作者: 抑制 時(shí)間: 2025-3-30 19:43
Viktor Vlasenko,S?awomir Stemplewski,Piotr Koczurll FPGA IP protection solution. Moreover, in this context we propose new architectures for the decoders of Reed-Muller and Golay codes, and show that our solutions are very attractive from both the area and error correction capability points of view.作者: ACRID 時(shí)間: 2025-3-30 23:49 作者: exceptional 時(shí)間: 2025-3-31 04:51
Maria Drakaki,Yannis L. Karnavas,Ioannis D. Chasiotis,Panagiotis Tzionas-box is typically in the range of one order of magnitude (in terms of “number of traces to recover the key”). They also confirm the importance of a profiled information theoretic analysis for the worst-case security evaluation of leaking devices. They finally raise the important question whether dua作者: blight 時(shí)間: 2025-3-31 08:38 作者: atrophy 時(shí)間: 2025-3-31 09:27