Sciweavers

2841 search results - page 85 / 569
» A Call to Order
Sort
View
CHES
2007
Springer
122views Cryptology» more  CHES 2007»
15 years 4 months ago
Two New Techniques of Side-Channel Cryptanalysis
Abstract. We describe two new techniques of side-channel cryptanalysis which we call the impossible collision attack and the multiset collision attack. These are inspired by the st...
Alex Biryukov, Dmitry Khovratovich
ECTEL
2007
Springer
15 years 4 months ago
Applying Sensemaking in a Mobile Learning Scenario
In this work, a new type of collaborative learning activity is proposed in order to enable students to explore and understand information in highly mobile situations. We call this ...
Gustavo Zurita, Nelson Baloian, Pedro Antunes, Fel...
SGAI
2007
Springer
15 years 4 months ago
Learning Sets of Sub-Models for Spatio-Temporal Prediction
In this paper we describe a novel technique which implements a spatiotemporal model as a set of sub-models based on first order logic. These sub-models model different, typicall...
Andrew Bennett, Derek R. Magee
IPPS
2002
IEEE
15 years 2 months ago
Aligning Two Fragmented Sequences
Upon completion of the human and mouse genome sequences, world-wide sequencing capacity will turn to other complex organisms. Current strategies call for many of these genomes to ...
Vamsi Veeramachaneni, Piotr Berman, Webb Miller
REX
1989
15 years 1 months ago
METATEM: A Framework for Programming in Temporal Logic
In this paper we further develop the methodology of temporal logic as an executable imperative language, presented by Moszkowski [Mos86] and Gabbay [Gab87, Gab89] and present a con...
Howard Barringer, Michael Fisher, Dov M. Gabbay, G...