Sciweavers

3865 search results - page 49 / 773
» Active memory operations
Sort
View
IJNSEC
2010
324views more  IJNSEC 2010»
14 years 11 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi
ASIACRYPT
2004
Springer
15 years 8 months ago
Time-Memory Trade-Off Attacks on Multiplications and T-Functions
T
Joydip Mitra, Palash Sarkar
PCI
2001
Springer
15 years 9 months ago
Communicating X-Machines: From Theory to Practice
Formal modeling of complex systems is a non-trivial task, especially if a formal method does not facilitate separate development of the components of a system. This paper describes...
Petros Kefalas, George Eleftherakis, Evangelos Keh...
AIRS
2010
Springer
15 years 1 months ago
Tuning Machine-Learning Algorithms for Battery-Operated Portable Devices
Machine learning algorithms in various forms are now increasingly being used on a variety of portable devices, starting from cell phones to PDAs. They often form a part of standard...
Ziheng Lin, Yan Gu, Samarjit Chakraborty
PPL
2008
117views more  PPL 2008»
15 years 4 months ago
Operating Systems in silicon and the Dynamic Management of Resources in Many-Core Chips
This discussion paper explores the problems of operating systems support when implementing concurrency controls at the level of the instruction set in processors designed for mult...
Chris R. Jesshope