This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…
This book introduces numerous algorithmic hybridizations between both worlds that show how machine learning can improve and support evolution strategies. The set of methods comprises covariance matrix estimation, meta-modeling of fitness and constraint functions, dimensionality reduction for search and visualization of high-dimensional optimization processes, and clustering-based niching. After…
The dissertation shows why innovations are vital to succeed in the low-income market segment, i.e. the four billion people living on less than 8 USD per day. In particular, it explores the role low-income consumers can play in corporate innovation processes. The study tests and expands theoretical findings on user innovations and lead users in the Brazilian low-income context. The findings also…
This rich study provides a comprehensive introduction to media philosophy while offering a new perspective on the concept and function of transmission media in all systems of exchange. Krämer uses the figure of the messenger as a key metaphor, examining a diverse range of transmission events, including the circulation of money, translation of languages, angelic visitations, spread of infectiou…