Sciweavers

223 search results - page 2 / 45
» How Much Semantic Data on Small Devices
Sort
View
RAS
2008
108views more  RAS 2008»
13 years 4 months ago
Towards long-lived robot genes
Robot projects are often evolutionary dead ends, with the software and hardware they produce disappearing without trace afterwards. Common causes include dependencies on uncommon ...
Paul M. Fitzpatrick, Giorgio Metta, Lorenzo Natale
APPT
2009
Springer
13 years 11 months ago
Performance Improvement of Multimedia Kernels by Alleviating Overhead Instructions on SIMD Devices
SIMD extension is one of the most common and effective technique to exploit data-level parallelism in today’s processor designs. However, the performance of SIMD architectures i...
Asadollah Shahbahrami, Ben H. H. Juurlink
ICMB
2006
IEEE
132views Business» more  ICMB 2006»
13 years 10 months ago
Generating User Interfaces from CDISC ODM for Mobile Devices
Clinical studies are often conducted as multi-centered studies involving participants at different locations. Thus it becomes obvious that using mobile platforms and remote data e...
Guido M. de Melo, Jürgen Nagler-Ihlein, Micha...
IACR
2011
132views more  IACR 2011»
12 years 4 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
DAGSTUHL
2007
13 years 6 months ago
How Fast can be Algebraic Attacks on Block Ciphers?
In this paper we give a specification of a new block cipher that can be called the Courtois Toy Cipher (CTC). It is quite simple, and yet very much like any other known block ciph...
Nicolas Courtois