نتایج جستجو برای: sensitivity analysis
تعداد نتایج: 3064509 فیلتر نتایج به سال:
The sensitivity analysis attacks by Kalker et al. constitute a known family of watermark removal attacks exploiting a vulnerability in some watermarking protocols: the attacker’s unlimited access to the watermark detector. In this paper, a new attack on spread spectrum schemes is designed. We first examine one of Kalker’s algorithms and prove its convergence using the law of large numbers, whic...
result of a model in response to changes some its key variables, keeping the value other variables constant. The sensitivity analysis is carried out considering one variable at time and always assuming that there independence between different influence or determine model.
Previously a complete ordinary differential equation (ODE) system was developed for tracking the solution x(~) of a parameterized system of nonlinear equations 0 = ~'(x,~) over an ~-interval [~0, ~]. This paper develops a two-phase complex homotopy continuation method for obtaining the required initial conditions at ~t °. An initial "short" artificial continuation is followed by a continuation ...
This paper proposes a new fault-based attack called the Fault Sensitivity Analysis (FSA) attack, which unlike most existing fault-based analyses including Differential Fault Analysis (DFA) does not use values of faulty ciphertexts. Fault sensitivity means the critical condition when a faulty output begins to exhibit some detectable characteristics, e.g., the clock frequency when fault operation...
K. Nester and H.-J. Panitz Institut für Meteorologie und Klimaforschung (IMK), Forschungszentrum Karlsruhe/Universität Karlsruhe, Hermann-von-Helmholtz-Platz 1, 76344 Eggenstein-Leopoldshafen, Germany Received: 2 May 2005 – Accepted: 1 July 2005 – Published: 13 September 2005 Correspondence to: K. Nester ([email protected]) © 2005 Author(s). This work is licensed under a Creative Commons ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید