Search

Your search keyword '"Institut Mines-Télécom [Paris] (IMT)-Télécom Paris"' showing total 53 results

Search Constraints

Start Over You searched for: Author "Institut Mines-Télécom [Paris] (IMT)-Télécom Paris" Remove constraint Author: "Institut Mines-Télécom [Paris] (IMT)-Télécom Paris" Publisher springer international publishing Remove constraint Publisher: springer international publishing
53 results on '"Institut Mines-Télécom [Paris] (IMT)-Télécom Paris"'

Search Results

1. Entropic Hardness of Module-LWE from Module-NTRU

2. Design of a Combinatorial Double Auction for Local Energy Markets

3. Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks

4. Persistent Fault Analysis with Few Encryptions

5. Highly Reliable PUFs for Embedded Systems, Protected Against Tampering

6. Augmented Voting Reality

7. A Primer on Alpha-Information Theory with Application to Leakage in Secrecy Systems

8. Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks

9. On Some Associations Between Mathematical Morphology and Artificial Intelligence

10. Self-secured PUF: Protecting the Loop PUF by Masking

11. Multi-source Fault Injection Detection Using Machine Learning and Sensor Fusion

12. Construction and Random Generation of Hypergraphs with Prescribed Degree and Dimension Sequences

13. Locating-Domination and Identification

14. Seq2VAR: Multivariate Time Series Representation with Relational Neural Networks and Linear Autoregressive Model

15. Static Data-Flow Analysis of UML/SysML Functional Views for Signal and Image Processing Applications

16. Catalic: Delegated PSI Cardinality with Applications to Contact Tracing

17. Knowledge Harvesting: Achievements and Challenges

18. On Plateaued Functions, Linear Structures and Permutation Polynomials

19. Provenance in Databases: Principles and Applications

20. From Behavioural Contracts to Session Types

21. Physical Security Versus Masking Schemes

22. A Closer Look at IP-ID Behavior in the Wild

23. Efficient Exact and Approximate Algorithms for Computing Betweenness Centrality in Directed Graphs

24. Acoustic Features for Environmental Sound Analysis

25. One Fitts’ Law, Two Metrics

26. Tabu Search Heuristic for Competitive Base Station Location Problem

27. The Notion of Self-aware Computing

28. Truthfulness of Candidates in Set of t-uples Expansion

29. Topological Relations Between Bipolar Fuzzy Sets Based on Mathematical Morphology

30. TLS for Cooperative ITS Services

31. How to Find the Best Rated Items on a Likert Scale and How Many Ratings Are Enough

32. Trends in Social Network Analysis

33. Formal Methods for Safe Design of Autonomous Systems Dedicated to Risk Management

34. Discovery and Registration: Finding and Integrating Components into Dynamic Systems

35. Perfect Failure Detection with Very Few Bits

36. A Model-Based Testing Process for Enhancing Structural Coverage in Functional Testing

37. Cost-Model Oblivious Database Tuning with Reinforcement Learning

38. Adaptive Web Crawling Through Structure-Based Link Classification

39. Segmentation of Tomatoes in Open Field Images with Shape and Temporal Constraints

40. Safety and Deferred Update in Transactional Memory

41. Asymptotics of Superposition of Point Processes

42. Designing Safe and Secure Embedded and Cyber-Physical Systems with SysML-Sec

43. Physically Unclonable Function: Principle, Design and Characterization of the Loop PUF

44. Boosting Higher-Order Correlation Attacks by Dimensionality Reduction

45. A Theoretical Study of Kolmogorov-Smirnov Distinguishers

46. DRECON: DPA Resistant Encryption by Construction

47. Representing Communicative Functions in SAIBA with a Unified Function Markup Language

48. Deep Learning for Audio and Music

49. A Framework for Multi-level Modeling of Analog/Mixed Signal Embedded Systems

50. MNE: Software for Acquiring, Processing, and Visualizing MEG/EEG Data

Catalog

Books, media, physical & digital resources