Sciweavers

1532 search results - page 68 / 307
» A Comparison of RESTART Implementations
Sort
View
136
Voted
JCP
2007
127views more  JCP 2007»
15 years 3 months ago
Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem
Abstract— Side channel attacks such as Simple Power Analysis(SPA) attacks provide a new challenge for securing algorithms from an attacker. Algorithms for elliptic curve point sc...
Andrew Byrne, Nicolas Meloni, Arnaud Tisserand, Em...
115
Voted
CSSE
2004
IEEE
15 years 3 months ago
A comparison of modeling strategies in defining XML-based access control languages
One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats....
Claudio Agostino Ardagna, Sabrina De Capitani di V...
111
Voted
CORR
2002
Springer
120views Education» more  CORR 2002»
15 years 3 months ago
A Comparison of Different Cognitive Paradigms Using Simple Animats in a Virtual Laboratory, with Implications to the Notion of C
In this thesis I present a virtual laboratory which implements five different models for controlling animats: a rule-based system, a behaviour-based system, a concept-based system...
Carlos Gershenson
243
Voted
COLING
2010
14 years 10 months ago
Robust Measurement and Comparison of Context Similarity for Finding Translation Pairs
In cross-language information retrieval it is often important to align words that are similar in meaning in two corpora written in different languages. Previous research shows tha...
Daniel Andrade, Tetsuya Nasukawa, Jun-ichi Tsujii
167
Voted
EJWCN
2011
197views more  EJWCN 2011»
14 years 10 months ago
Comparison among Cognitive Radio Architectures for Spectrum Sensing
Recently, the growing success of new wireless applications and services has led to overcrowded licensed bands, inducing the governmental regulatory agencies to consider more flex...
Luca Bixio, Marina Ottonello, Mirco Raffetto, Carl...