Results 11 to 20 of about 264,335 (250)

On the Average Random Probing Model

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems
Masking is one of the main countermeasures against side-channel analysis since it relies on provable security. In this context, “provable” means that a security bound can be exhibited for the masked implementation through a theoretical analysis in a ...
Julien Béguinot, Loïc Masure
doaj   +4 more sources

Performance Evaluation of Quadratic Probing and Random Probing Algorithms in modeling Hashing Technique

open access: diamondJournal of Soft Computing and Data Mining, 2022
In hashing technique, a hash table and hash map represent a data structure for a group of objects to map between key and value pairs, as the hash table is affected by collision and overflow. The hash table collision and overflow can be handled by searching the hash table in some systematic fashion for a bucket that is not full.
Raghda Abdulbaqi Mugher   +1 more
openaire   +3 more sources

Modeling of Correlation Optical Reflectometer with a Probing Signal in the Form of Pseudo-Random Sequences Fragments

open access: diamondProceedings of Telecommunication Universities, 2022
Traditionally, the most informative means of measuring the parameters of linear optical paths of fiberoptic communication systems is an optical time domain reflectometer with a simple probing signal. The disadvantages of such a reflectometer are known limitations on the dynamic range and resolution.
V. Khrichkov
openaire   +3 more sources

Worse than Random? An Embarrassingly Simple Probing Evaluation of Large Multimodal Models in Medical VQA [PDF]

open access: greenFindings of the Association for Computational Linguistics: ACL 2025
Large Multimodal Models (LMMs) have shown remarkable progress in medical Visual Question Answering (Med-VQA), achieving high accuracy on existing benchmarks. However, their reliability under robust evaluation is questionable. This study reveals that when subjected to simple probing evaluation, state-of-the-art models perform worse than random guessing ...
Yan, Qianqi   +3 more
  +6 more sources

Analysis of Robin Hood and Other Hashing Algorithms Under the Random Probing Model, With and Without Deletions

open access: goldCombinatorics, Probability and Computing, 2018
Thirty years ago, the Robin Hood collision resolution strategy was introduced for open addressing hash tables, and a recurrence equation was found for the distribution of its search cost. Although this recurrence could not be solved analytically, it allowed for numerical computations that, remarkably, suggested that the variance of the search cost ...
Poblete, P. V., Viola, A.
openaire   +4 more sources

Simulation of bubbly flow in vertical pipes by coupling Lagrangian and Eulerian models with 3D random walks models: Validation with experimental data using multi-sensor conductivity probes and Laser Doppler Anemometry

open access: greenNuclear Engineering and Design, 2012
[EN] A set of two phase flow experiments for different conditions ranging from bubbly flow to cap/slug flow have been performed under isothermal concurrent upward air-water flow conditions in a vertical column of 3m height. Special attention in these experiments was devoted to the transition from bubbly to cap/slug flow. The interfacial velocity of the
J. L. Muñoz-Cobo   +3 more
openaire   +4 more sources

Testing Security Equivalence in the Random Probing Model

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems
The random probing model is a theoretical model that abstracts the physical leakage of an embedded device running a cryptographic scheme with more realistic assumptions compared to the threshold probing model.
Anna Guinet   +5 more
doaj   +3 more sources

Secure and Verified Cryptographic Implementations in the Random Probing Model

open access: green, 2023
La contre-mesure de masquage est l'une des contre-mesures les plus puissantes pour contrer les attaques side-channel. Des modèles de fuite ont été exposés pour raisonner théoriquement sur la sécurité de telles implémentations masquées. Jusqu'à présent, le modèle de fuite le plus largement utilisé est le probing model par Ishai, Sahai et Wagner (CRYPTO ...
Abdul Rahman Taleb
openaire   +3 more sources

Comparative Evaluation of Bandit-Style Heuristic Policies for Moving Target Detection in a Linear Grid Environment [PDF]

open access: yesSensors
Moving-target detection under strict sensing constraints is a recurring subproblem in surveillance, search-and-rescue, and autonomous robotics. We study a canonical one-dimensional finite grid in which a sensor probes one location per time step with ...
Hyunmin Kang, Minho Ahn, Yongduek Seo
doaj   +2 more sources

Comparison of Supervised Machine Learning Models to Logistic Regression Model Using Tooth-Related Factors to Predict the Outcome of Nonsurgical Periodontal Treatment [PDF]

open access: yesDiagnostics
Background/Objectives: Conventional logistic regression is widely used in the field of dentistry, specifically for prediction purposes in longitudinal studies.
Ali J. B. Al-Sharqi   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy