Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
4
views
21
references
Top references
cited by
5
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
848
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Parallel and Distributed Processing and Applications : Third International Symposium, ISPA 2005, Nanjing, China, November 2-5, 2005. Proceedings
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak
other
Author(s):
Daniel J. Bernstein
,
Joachim Breitner
,
Daniel Genkin
,
Leon Groot Bruinderink
,
Nadia Heninger
,
Tanja Lange
,
Christine van Vredendaal
,
Yuval Yarom
Publication date
(Online):
August 25 2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Anti-Trafficking Review
Most cited references
21
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Last-Level Cache Side-Channel Attacks are Practical
Fangfei Liu
,
Yuval Yarom
,
Qian Ge
…
(2015)
0
comments
Cited
61
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Handbook of Applied Cryptography
Alfred J. Menezes
,
Paul C. van Oorschot
,
Scott A. Vanstone
(2018)
0
comments
Cited
53
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Cross-VM side channels and their use to extract private keys
Ari Juels
,
Thomas Ristenpart
,
Yinqian Zhang
…
(2012)
0
comments
Cited
46
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2017
Publication date (Online):
August 25 2017
Pages
: 555-576
DOI:
10.1007/978-3-319-66787-4_27
SO-VID:
d4443046-7df3-497c-acda-fa1b4f7d7a10
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Introduction
pp. 1
Introduction
pp. 1
Network and Control Platforms
pp. 1
The char-set method and its applications to automated reasoning
pp. 1
Dark Web: Exploring and Mining the Dark Side of the Web
pp. 1
Prediction and Visualization for Urban Heat Island Simulation
pp. 1
Neural Spatial Interaction Models: Network Training, Model Complexity and Generalization Performance
pp. 1
Orchids Classification Using Spatial Transformer Network with Adaptive Scaling
pp. 3
Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs
pp. 3
Design Decisions for a Real Time, Alcohol Craving Study Using Physio- and Psychological Measures
pp. 3
A Side-Channel Assisted Cryptanalytic Attack Against QcBits
pp. 3
Casl Summary
pp. 7
An Adaptive Formal Metamodel for Semantic Complex Event Processing-Driven Social Internet of Things Network
pp. 7
Making Assumptions for Efficiency Reasons
pp. 11
Scalable Dictionary Classifiers for Time Series Classification
pp. 11
Previous work on syntactic ambiguity resolution
pp. 12
Architecture Design and Avatar Customization of On-Line Expo
pp. 17
3D-VUPID: 3D Visual Urban Planning Integrated Data
pp. 17
Argumentation Schemes for Events Suggestion in an e-Health Platform
pp. 19
Semantic Discovery in the Web of Things
pp. 2
Declarative Modeling for Machine Learning and Data Mining
pp. 21
Practical Signing-Right Revocation
pp. 24
Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages
pp. 25
Telecom Applications, APIs and Service Platforms
pp. 26
Making Assumptions for Efficiency Reasons
pp. 26
Uncovering Information Flow Policy Violations in C Programs (Extended Abstract)
pp. 28
Theoretical framework
pp. 4
Decidable call by need computations in term rewriting (extended abstract)
pp. 73
Casl Syntax
pp. 115
Casl Semantics
pp. 20
Optimization of the Numeric and Categorical Attribute Weights in KAMILA Mixed Data Clustering Algorithm
pp. 20
3D Face Texture Stitching Based on Differential Coordinates
pp. 3
Can Concepts Reveal Criminals?
pp. 31
e-Coaching for Intensive Cardiac Rehabilitation
pp. 32
Challenges When Moving from Monolith to Microservice Architecture
pp. 33
Efficient Implementation of Bayesian Hierarchical Model to Study Space Time Variability of Latent Heat Flux
pp. 35
Loglinear models for ambiguity resolution
pp. 40
Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness
pp. 45
An Empirical Survey of Assumptions
pp. 45
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures
pp. 47
Value Added Services in the Evolving Multimedia Communication Network
pp. 47
BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning
pp. 51
Source and target languages
pp. 27
Physically-Based Tree Animation and Leaf Deformation Using CUDA in Real-Time
pp. 275
Casl Logic
pp. 28
Meaningful Data Sampling for a Faithful Local Explanation Method
pp. 34
On equality up-to constraints over finite trees, context unification, and one-step rewriting
pp. 4
Cartification: From Similarities to Itemset Frequencies
pp. 43
A Scoped Review of the Potential for Supportive Virtual Coaches as Adjuncts to Self-guided Web-Based Interventions
pp. 45
Ports and Urban Transformation: A Comparative Analysis on Project Basis: The Case of Taranto and Naples
pp. 48
IoT Application Deployment Using Request-Response Pattern with MQTT
pp. 51
Modeling new words
pp. 60
A Four Component Architecture for Knowledge-Based Systems
pp. 60
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices
pp. 68
Static Detection of Uninitialized Stack Variables in Binary Code
pp. 77
NGN Standardization as a Strength
pp. 82
The compiler proof
pp. 138
Conclusions
pp. 363
Casl Libraries
pp. 39
Classifying Prostate Histological Images Using Deep Gaussian Processes on a New Optical Density Granulometry-Based Descriptor
pp. 40
Simulation of Implosion and Transportation of Ore in Digital Mine
pp. 49
Dedam: A kernel of data structures and algorithms for automated deduction with equality clauses
pp. 5
Processes Are Concepts, Aren’t They?
pp. 55
Augmenting Group Medical Visits with Conversational Agents for Stress Management Behavior Change
pp. 61
Preparing Detailed 3D Building Models for Google Earth Integration
pp. 61
Wireless Brain-Computer Interface for Wheelchair Control by Using Fast Machine Learning and Real-Time Hyper-Dimensional Classification
pp. 71
Part-of-speech ambiguity
pp. 78
Logics for Knowledge-Based Systems: MLPM and MCL
pp. 82
Controversy in Trust Networks
pp. 88
Towards Automated Application-Specific Software Stacks
pp. 90
A Short History of VoIP Services
pp. 93
High-Order Conversion from Boolean to Arithmetic Masking
pp. 101
Enabling Key Migration Between Non-compatible TPM Versions
pp. 111
NGN Shortcomings
pp. 113
Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices
pp. 115
Reconciling \(d+1\) Masking in Hardware and Software
pp. 47
Adaptive Orthogonal Characteristics of Bio-inspired Neural Networks
pp. 49
An Automatic and Robust Chessboard Corner Extraction
pp. 53
The Clause-Diffusion theorem prover Peers-mcd (system description)
pp. 6
Rough Sets and FCA – Scalability Challenges
pp. 69
Letters to Medical Devices: A Case Study on the Medical Device User Requirements of Female Adolescents and Young Adults with Type 1 Diabetes
pp. 75
Case Study: Building a Serverless Messenger Chatbot
pp. 77
VGI, Augmented Reality and Smart Web Application: Projects of Development in the Territory of the Sardinia Region
pp. 95
A Verification Framework for Knowledge-Based Systems
pp. 97
Prepositional phrase attachment disambiguation
pp. 109
Conclusions
pp. 118
An IT Perspective on Standards, Service Architectures and Platforms
pp. 119
Bundling Evidence for Layered Attestation
pp. 134
Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails
pp. 137
Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing
pp. 57
An Adaptive Gradient Enhanced Texture Based Tracking Algorithm for Video Monitoring Applications
pp. 57
Integration of automated and interactive theorem proving in ILF
pp. 60
Using Deep Learning for Ordinal Classification of Mobile Marketing User Conversion
pp. 87
Four Key Factors to Design a Web of Things Architecture
pp. 93
A PHD-Filter-Based Multitarget Tracking Algorithm for Sensor Networks
pp. 99
Methods for Context Explication and Adaptation
pp. 108
Formal Representation of Fuzzy Data Model Using Description Logic
pp. 120
Organizing a Library of Problem-Solving Methods
pp. 138
A Review: What Matters for Ecosystem Business Strategy
pp. 140
An Arbiter PUF Secured by Remote Random Reconfigurations of an FPGA
pp. 151
Feistel Structures for MPC, and More
pp. 154
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures
pp. 16
Logical Analysis of Concept Lattices by Factorization
pp. 61
ILF-SETHEO
pp. 67
A Novel Method for Large Crowd Flow
pp. 68
Modeling Data Driven Interactions on Property Graph
pp. 92
Liquid Transfer of User Identity
pp. 95
Personalized Assistant for Health-Conscious Grocery Shoppers
pp. 107
Exploring the Links Between Persuasion, Personality and Mobility Types in Personalized Mobility Applications
pp. 108
Engineering Task-Automation Systems for Domain Specificity
pp. 120
Space-Time Variability of Summer Temperature Field over Bangladesh during 1948-2007
pp. 133
Conclusions and Future Work
pp. 155
New Regulatory Approaches in an Evolving Market Structure
pp. 172
Arithmetic Garbling from Bilinear Maps
pp. 175
Nanofocused X-Ray Beam to Reprogram Secure Circuits
pp. 28
Basic Level of Concepts in Formal Concept Analysis
pp. 65
SETHEO goes software engineering: Application of ATP to software reuse
pp. 76
Adaptive Dimensionality Adjustment for Online “Principal Component Analysis”
pp. 79
Evoking Panic in Crowd Simulation
pp. 120
A Homemade Pill Dispenser Prototype Supporting Elderly
pp. 136
DSMs Extraction Methodologies from EROS-B “Pseudo-Stereopairs”, PRISM Stereopairs in Coastal and Post-seismic Areas
pp. 182
Virtualizing Devices
pp. 189
Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks
pp. 195
SEPD: An Access Control Model for Resource Sharing in an IoT Environment
pp. 45
A Peep through the Looking Glass: Articulation Points in Lattices
pp. 69
Proving System Correctness with KIV 3.0
pp. 85
Relevance Metric for Counterfactuals Selection in Decision Trees
pp. 89
A Behavior Model Based On Information Transmission for Crowd Simulation
pp. 125
Towards an Acceptance Testing Approach for Internet of Things Systems
pp. 135
Computers and People Alike
pp. 150
Development of a Software to Plan UAVs Stereoscopic Flight: An Application on Post Earthquake Scenario in L’Aquila City
pp. 203
Virtualizing Platforms
pp. 213
McBits Revisited
pp. 217
Nighthawk: Transparent System Introspection from Ring -3
pp. 61
Practical Use of Formal Concept Analysis in Service-Oriented Computing
pp. 73
A practical symbolic algorithm for the inverse kinematics of 6R manipulators with simple geometry
pp. 94
Weighted Nearest Centroid Neighbourhood
pp. 99
Pattern Based Motion for Crowd Simulation
pp. 102
The Prevalence of Errors in Machine Learning Experiments
pp. 111
Adding Physical Like Reaction Effects to Skeleton-Based Animations Using Controllable Pendulums
pp. 143
ABC Algorithm for URL Extraction
pp. 149
Office Workers’ Perceived Barriers and Facilitators to Taking Regular Micro-breaks at Work: A Diary-Probed Interview Study
pp. 166
An Assessment of Quantitative Uncertainty Visualization Methods for Interpolated Meteorological Data
pp. 227
Virtualizing Network
pp. 232
High-Speed Key Encapsulation from NTRU
pp. 239
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement
pp. 77
Publication Analysis of the Formal Concept Analysis Community
pp. 87
Automatic verification of cryptographic protocols with SETHEO
pp. 101
A practical integration of first-order reasoning and decision procedures
pp. 110
A Hybrid Model for Fraud Detection on Purchase Orders
pp. 122
Movement Classes from Human Motion Data
pp. 149
Towards a UML and IFML Mapping to GraphQL
pp. 163
On the Design of Subly: Instilling Behavior Change During Web Surfing Through Subliminal Priming
pp. 179
The Classification of Space-Time Behaviour Patterns in a British City from Crowd-Sourced Data
pp. 253
FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary Goppa Codes
pp. 257
Internet of Things
pp. 263
Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics
pp. 96
Understanding the Semantic Structure of Human fMRI Brain Recordings with Formal Concept Analysis
pp. 112
Cubes of Concepts: Multi-dimensional Exploration of Multi-valued Contexts
pp. 116
Some pitfalls of LK-to-LJ translations and how to avoid them
pp. 121
Users Intention Based on Twitter Features Using Text Analytics
pp. 132
Front View vs. Side View of Facial and Postural Expressions of Emotions in a Virtual Character
pp. 156
Accessing Government Open Data Through Chatbots
pp. 175
Kilowh.at – Increasing Energy Awareness Using an Interactive Energy Comparison Tool
pp. 193
Available and Implementable Technologies for Virtual Tourism: A Prototypal Station Project
pp. 277
Blockcipher-Based Authenticated Encryption: How Small Can We Go?
pp. 283
Internet of Services
pp. 283
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy
pp. 128
Ordinal Factor Analysis
pp. 129
Mixing Hetero- and Homogeneous Models in Weighted Ensembles
pp. 131
Deciding intuitionistic propositional logic via translation into classical logic
pp. 144
Evaluating Emotional Content of Acted and Algorithmically Modified Motions
pp. 166
Using Ontologies for Official Statistics: The Istat Experience
pp. 187
Persuasive Technology Against Public Nuisance – Public Urination in the Urban Nightlife District
pp. 205
Flickr Geotagged and Publicly Available Photos: Preliminary Study of Its Adequacy for Helping Quality Control of Corine Land Cover
pp. 299
Gimli : A Cross-Platform Permutation
pp. 137
A Hybrid Approach to Time Series Classification with Shapelets
pp. 140
A Macroscopic Approach to FCA and Its Various Fuzzifications
pp. 146
Lemma matching for a PTTP-based top-down theorem prover
pp. 154
An Emotion Model for Virtual Agents with Evolvable Motivation
pp. 173
Ontology Population from Raw Text Corpus for Open-Source Intelligence
pp. 201
Commitment Devices as Behavior Change Support Systems: A Study of Users’ Perceived Competence and Continuance Intention
pp. 221
Towards Developing an Integrated Quality Map Production Environment in Commercial Cartography
pp. 321
GIFT: A Small Present
pp. 145
An Ensemble Algorithm Based on Deep Learning for Tuberculosis Classification
pp. 148
A Connection between Clone Theory and FCA Provided by Duality Theory
pp. 161
Exact knowledge compilation in predicate calculus: The partial achievement case
pp. 164
Sketch-Based Skeleton-Driven 2D Animation and Motion Capture
pp. 191
Named Entity Recognition in Twitter Using Images and Text
pp. 215
“Don’t Say That!”
pp. 238
Becoming Urban: How Urbanization Influences the Loss of Arable Land in Peri-urban Hanoi
pp. 344
An Efficiently Searchable Encrypted Data Structure for Range Queries
pp. 346
Making Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices
pp. 155
A Data-Driven Approach to Automatic Extraction of Professional Figure Profiles from Résumés
pp. 164
Formal Concept Discovery in Semantic Web Data
pp. 176
Non-horn magic sets to incorporate top-down inference into bottom-up theorem proving
pp. 182
A Multi-layer Model for Face Aging Simulation
pp. 200
Online Expectation Maximization for Language Characterization of Streaming Text
pp. 227
Using Argumentation to Persuade Students in an Educational Recommender System
pp. 253
Integration of Spatial Networks in Data Warehouses: A UML Profile
pp. 367
GDPiRated – Stealing Personal Information On- and Offline
pp. 367
Back to Massey: Impressively Fast, Scalable and Tight Security Evaluation Tools
pp. 166
Retrieving and Processing Information from Clinical Algorithm via Formal Concept Analysis
pp. 180
Concept Lattices of Incomplete Data
pp. 191
Alternating automata: Unifying truth and validity checking for temporal logics
pp. 193
Particle-Based Fracture Simulation on the GPU
pp. 213
Analysing Cultural Events on Twitter
pp. 241
Pokémon WALK: Persuasive Effects of Pokémon GO Game-Design Elements
pp. 268
Design of a Coastal Transport Integrated System: Preliminary System Specifications and Data Collection for the Aegean Sea Islands
pp. 387
Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation
pp. 387
Fast Leakage Assessment
pp. 175
Comparative Analysis of Approaches to Building Medical Dialog Systems in Russian
pp. 195
Formal Concept Analysis as a Framework for Business Intelligence Technologies
pp. 206
Mining Subsidence Prediction Based on 3D Stratigraphic Model and Visualization
pp. 207
Connection-based proof construction in linear logic
pp. 223
Harvesting Knowledge from Social Networks: Extracting Typed Relationships Among Entities
pp. 403
Your Rails Cannot Hide from Localized EM: How Dual-Rail Logic Fails on FPGAs
pp. 412
OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform
pp. 184
Tracking Position and Status of Electric Control Switches Based on YOLO Detector
pp. 211
Good Classification Tests as Formal Concepts
pp. 216
Detail-Preserving Rendering of Free Surface Fluid with Lattice Boltzmann
pp. 222
Resource-distribution via Boolean constraints
pp. 228
Novel Comment Spam Filtering Method on Youtube: Sentiment Analysis and Personality Recognition
pp. 267
Strategies and Design Principles to Minimize Negative Side-Effects of Digital Motivation on Teamwork
pp. 294
Application of Advanced Hybrid Genetic Algorithms for Optimal Locations of High School
pp. 425
How to Break Secure Boot on FPGA SoCs Through Malicious Hardware
pp. 439
Privacy-Preserving Collaborative Medical Time Series Analysis Based on Dynamic Time Warping
pp. 195
A Self-generating Prototype Method Based on Information Entropy Used for Condensing Data in Classification Tasks
pp. 227
Modeling Preferences over Attribute Sets in Formal Concept Analysis
pp. 227
A Human Action Recognition Algorithm Based on Semi-supervised Kmeans Clustering
pp. 237
Constructing a normal form for Property Theory
pp. 279
Investigation of Social Predictors of Competitive Behavior in Persuasive Technology
pp. 304
Urban Residential Land Value Analysis: The Case of Potenza
pp. 463
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography
pp. 208
Transfer Knowledge Between Sub-regions for Traffic Prediction Using Deep Learning Method
pp. 237
A New Region Growing Algorithm for Triangular Mesh Recovery from Scattered 3D Points
pp. 244
Finding Top-N Colossal Patterns Based on Clique Search with Dynamic Update of Graph
pp. 252
Measuring Personal Branding in Social Media: Towards an Influence Indication Score
pp. 315
Detection of Fast Landscape Changes: The Case of Solar Modules on Agricultural Land
pp. 468
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
pp. 484
Strongly Secure Identity-Based Key Exchange with Single Pairing Operation
pp. 220
Global Q-Learning Approach for Power Allocation in Femtocell Networks
pp. 247
Detecting Moving Targets from Traffic Video Based on the Dynamic Background Model
pp. 256
Plagiator — A learning prover
pp. 260
Quantitative Concept Analysis
pp. 265
Big Web Data: Warehousing and Analytics
pp. 328
UAV Panoramic Images for Waterfront Landscape Analysis and TopographicDB Texturing
pp. 490
On the Security of Carrier Phase-Based Ranging
pp. 504
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope
pp. 229
Deep Learning and Sensor Fusion Methods for Studying Gait Changes Under Cognitive Load in Males and Females
pp. 256
Real-Time Implementation for Weighted-Least-Squares-Based Edge-Preserving Decomposition and Its Applications
pp. 260
CODE: A powerful prover for problems of condensed detachment
pp. 267
Model-Based Development of JavaScript Web Applications
pp. 278
Some Notes on Managing Closure Operators
pp. 513
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
pp. 521
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids
pp. 238
Towards a Robotic Personal Trainer for the Elderly
pp. 264
A new method for testing decision procedures in modal logics
pp. 269
Liquid Web Applications: ICWE2017 Tutorial
pp. 292
Distributed Formal Concept Analysis Algorithms Based on an Iterative MapReduce Framework
pp. 358
Integration of the Multi-scale Heterogeneous Data for the Deployment of the Concept of Energy Efficiency in Buildings within an SDI Framework
pp. 534
A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
pp. 545
The Risks of WebGL: Analysis, Evaluation and Detection
pp. 247
Image Quality Constrained GAN for Super-Resolution
pp. 268
Minlog: A minimal logic theorem prover
pp. 375
On Model Based Clustering in a Spatial Data Mining Context
pp. 555
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak
pp. 565
Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks
pp. 257
Use Case Prediction Using Product Reviews Text Classification
pp. 389
Polarization and Hierarchies in Air Passenger Transport in Europe
pp. 579
Faster Homomorphic Function Evaluation Using Non-integral Base Encoding
pp. 586
Fingerprint Surface-Based Detection of Web Bot Detectors
pp. 265
Convolutional Neural Network for Core Sections Identification in Scientific Research Publications
pp. 403
Bivariate Spatial Clustering Analysis of Point Patterns: A Graph-Based Approach
pp. 601
Hiding Secrecy Leakage in Leaky Helper Data
pp. 606
Testing for Integrity Flaws in Web Sessions
pp. 274
Knowledge Inference Through Analysis of Human Activities
pp. 291
A colored version of the λ-calculus
pp. 419
Spatial Statistical Models for the Evaluation of the Landscape
pp. 623
Very High Order Masking: Efficient Implementation and Security Evaluation
pp. 282
Representation Learning of Knowledge Graphs with Multi-scale Capsule Network
pp. 306
A practical implementation of simple consequence relations using inductive definitions
pp. 433
Estimative Analysis of a Segment of the Bare Ownership Market of Residential Property
pp. 644
PRESENT Runs Fast
pp. 291
CNNPSP: Pseudouridine Sites Prediction Based on Deep Learning
pp. 444
A Proposal for a Discriminant Analysis Based on the Results of a Preliminary Fuzzy Clustering
pp. 665
Four\(\mathbb {Q}\) on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks
pp. 302
A Multimodal Approach to Image Sentiment Analysis
pp. 336
A classification of non-liftable orders for resolution
pp. 457
LMS for Outliers Detection in the Analysis of a Real Estate Segment of Bari
pp. 310
Joining Items Clustering and Users Clustering for Evidential Collaborative Filtering
pp. 319
Conditioned Generative Model via Latent Semantic Controlling for Learning Deep Representation of Data
pp. 366
Proof tactics for a theory of state machines in a graphical environment
pp. 489
The Supply of the Tourist Services: A Case Study
pp. 328
Toward a Framework for Seasonal Time Series Forecasting Using Clustering
pp. 380
RALL: Machine-supported proofs for relation algebra
pp. 501
The Statistical Matching: An Integrated Archive of the Lifestyles of Italian Families
pp. 341
An Evidential Imprecise Answer Aggregation Approach Based on Worker Clustering
pp. 395
Nuprl-Light: An implementation framework for higher-order logics
pp. 515
The Role of Social Networks for New Strategies of Urban Regeneration
pp. 350
Combining Machine Learning and Classical Optimization Techniques in Vehicle to Vehicle Communication Network
pp. 400
XIsabelle: A system description
pp. 528
Smart Communities Meet Urban Management: Harnessing the Potential of Open Data and Public/Private Partnerships through Innovative E-Governance Applications
pp. 359
Adversarial Edit Attacks for Tree Data
pp. 404
XBarnacle: Making theorem provers more accessible
pp. 541
A Multi-criteria and Multi-group Analysis for Historic District Quality Assessment
pp. 367
Non-stationary Noise Cancellation Using Deep Autoencoder Based on Adversarial Learning
pp. 408
The tableau browser SNARKS
pp. 556
Multidimensional Approaches to Evaluate Urban Planning Scenarios
pp. 375
A Deep Learning-Based Surface Defect Inspection System for Smartphone Glass
pp. 412
Jape: A calculator for animating proof-on-paper
pp. 572
A Spatial Multicriteria Assessment Decision Support System (SMCA-DSS) for East Naples: Towards a Water Opportunity Map
pp. 386
Superlinear Speedup of Parallel Population-Based Metaheuristics: A Microservices and Container Virtualization Approach
pp. 416
Evolving combinators
pp. 587
Spatial Analysis of Soil Consumption and as Support to Transfer Development Rights Mechanisms
pp. 394
Active Dataset Generation for Meta-learning System Quality Improvement
pp. 431
Partial matching for analogy discovery in proofs and counter-examples
pp. 600
The Estimation of the Depreciation of Property Due to Environmental Risk: The Case of Taranto
pp. 402
Do You Really Follow Them? Automatic Detection of Credulous Twitter Users
pp. 446
Dialog
pp. 614
An Extensible and Decoupled Architectural Model for Authorization Frameworks
pp. 411
User Localization Based on Call Detail Record
pp. 629
Quasi-inverse Based Cryptography
pp. E1
Correction to: SATO: An Efficient Propositional Prover
pp. 424
Automatic Ground Truth Dataset Creation for Fake News Detection in Social Media
pp. 437
Artificial Flora Optimization Algorithm for Task Scheduling in Cloud Computing Environment
pp. 446
A Significantly Faster Elastic-Ensemble for Time-Series Classification
pp. 454
ALIME: Autoencoder Based Approach for Local Interpretability
pp. 464
Detection of Abnormal Load Consumption in the Power Grid Using Clustering and Statistical Analysis
pp. 476
Deep Convolutional Neural Networks Based on Image Data Augmentation for Visual Object Recognition
pp. 486
An Efficient Scheme for Prototyping kNN in the Context of Real-Time Human Activity Recognition
pp. 494
A Novel Recommendation System for Next Feature in Software
pp. 502
Meta-learning Based Evolutionary Clustering Algorithm
pp. 514
Fast Tree-Based Classification via Homogeneous Clustering
pp. 525
Ordinal Equivalence Classes for Parallel Coordinates
pp. 534
New Internal Clustering Evaluation Index Based on Line Segments
pp. 542
Threat Identification in Humanitarian Demining Using Machine Learning and Spectroscopic Metal Detection
Similar content
848
The nature of left- and right-dominant sandhi in Shanghai Chinese—Evidence from the effects of speech rate and focus conditions
Authors:
Bijun Ling
,
Jie Liang
Impact on hospital mortality and morbidity of right ventricular involvement among patients with acute left ventricular infarction
Translated title: Impacto do envolvimento do ventrículo direito na morbidade e mortalidade hospitalar em pacientes com infarto agudo do ventrículo esquerdo
Authors:
Afonso Celso Pereira
,
Roberto Alexandre Franken
,
Sandra Regina Schwarzwälder Sprovieri
…
How Far Is fhe Asynchronism of the R-waves of the Right and Left Electrocardiogram Influenced by Different Placement of the Indifferent Electrode
Authors:
Franz Groedel
See all similar
Cited by
5
Side-Channeling the Kalyna Key Expansion
Authors:
Chitchanok Chuengsatiansup
,
Daniel Genkin
,
Yuval Yarom
…
Analytic Formulas for Renyi Entropy of Hidden Markov Models
Authors:
Maciej Skórski
,
Joachim Breitner
CIDPro: Custom Instructions for Dynamic Program Diversification
Authors:
Alexander Fell
,
Arnab Biswas
,
Siew-Kei Lam
…
See all cited by