Results 11 to 20 of about 264,335 (250)
On the Average Random Probing Model
Masking is one of the main countermeasures against side-channel analysis since it relies on provable security. In this context, “provable” means that a security bound can be exhibited for the masked implementation through a theoretical analysis in a ...
Julien Béguinot, Loïc Masure
doaj +4 more sources
In hashing technique, a hash table and hash map represent a data structure for a group of objects to map between key and value pairs, as the hash table is affected by collision and overflow. The hash table collision and overflow can be handled by searching the hash table in some systematic fashion for a bucket that is not full.
Raghda Abdulbaqi Mugher +1 more
openaire +3 more sources
Traditionally, the most informative means of measuring the parameters of linear optical paths of fiberoptic communication systems is an optical time domain reflectometer with a simple probing signal. The disadvantages of such a reflectometer are known limitations on the dynamic range and resolution.
V. Khrichkov
openaire +3 more sources
Worse than Random? An Embarrassingly Simple Probing Evaluation of Large Multimodal Models in Medical VQA [PDF]
Large Multimodal Models (LMMs) have shown remarkable progress in medical Visual Question Answering (Med-VQA), achieving high accuracy on existing benchmarks. However, their reliability under robust evaluation is questionable. This study reveals that when subjected to simple probing evaluation, state-of-the-art models perform worse than random guessing ...
Yan, Qianqi +3 more
+6 more sources
Thirty years ago, the Robin Hood collision resolution strategy was introduced for open addressing hash tables, and a recurrence equation was found for the distribution of its search cost. Although this recurrence could not be solved analytically, it allowed for numerical computations that, remarkably, suggested that the variance of the search cost ...
Poblete, P. V., Viola, A.
openaire +4 more sources
[EN] A set of two phase flow experiments for different conditions ranging from bubbly flow to cap/slug flow have been performed under isothermal concurrent upward air-water flow conditions in a vertical column of 3m height. Special attention in these experiments was devoted to the transition from bubbly to cap/slug flow. The interfacial velocity of the
J. L. Muñoz-Cobo +3 more
openaire +4 more sources
Testing Security Equivalence in the Random Probing Model
The random probing model is a theoretical model that abstracts the physical leakage of an embedded device running a cryptographic scheme with more realistic assumptions compared to the threshold probing model.
Anna Guinet +5 more
doaj +3 more sources
Secure and Verified Cryptographic Implementations in the Random Probing Model
La contre-mesure de masquage est l'une des contre-mesures les plus puissantes pour contrer les attaques side-channel. Des modèles de fuite ont été exposés pour raisonner théoriquement sur la sécurité de telles implémentations masquées. Jusqu'à présent, le modèle de fuite le plus largement utilisé est le probing model par Ishai, Sahai et Wagner (CRYPTO ...
Abdul Rahman Taleb
openaire +3 more sources
Comparative Evaluation of Bandit-Style Heuristic Policies for Moving Target Detection in a Linear Grid Environment [PDF]
Moving-target detection under strict sensing constraints is a recurring subproblem in surveillance, search-and-rescue, and autonomous robotics. We study a canonical one-dimensional finite grid in which a sensor probes one location per time step with ...
Hyunmin Kang, Minho Ahn, Yongduek Seo
doaj +2 more sources
Comparison of Supervised Machine Learning Models to Logistic Regression Model Using Tooth-Related Factors to Predict the Outcome of Nonsurgical Periodontal Treatment [PDF]
Background/Objectives: Conventional logistic regression is widely used in the field of dentistry, specifically for prediction purposes in longitudinal studies.
Ali J. B. Al-Sharqi +4 more
doaj +2 more sources

