Sciweavers

12 search results - page 2 / 3
» From entry to access: how shareability comes about
Sort
View
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
13 years 11 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
JSW
2008
152views more  JSW 2008»
13 years 4 months ago
Reasoning with Semantic Web Technologies in Ubiquitous Computing Environment
--The vast amounts of data about people, things and the environment will require new ways of handling, searching and presenting information. New applications will increasingly be a...
WenYing Guo
ICSE
2007
IEEE-ACM
13 years 11 months ago
ACL2s: "The ACL2 Sedan"
ACL2 is the latest inception of the Boyer-Moore theorem prover, the 2005 recipient of the ACM Software System Award. In the hands of an expert, it feels like a finely tuned race ...
Peter C. Dillinger, Panagiotis Manolios, Daron Vro...
EDBT
2009
ACM
156views Database» more  EDBT 2009»
13 years 8 months ago
Efficient skyline retrieval with arbitrary similarity measures
A skyline query returns a set of objects that are not dominated by other objects. An object is said to dominate another if it is closer to the query than the latter on all factors...
Deepak P, Prasad M. Deshpande, Debapriyo Majumdar,...
CCR
2010
179views more  CCR 2010»
13 years 5 months ago
An argument for increasing TCP's initial congestion window
TCP flows start with an initial congestion window of at most four segments or approximately 4KB of data. Because most Web transactions are short-lived, the initial congestion wind...
Nandita Dukkipati, Tiziana Refice, Yuchung Cheng, ...