Sciweavers

7253 search results - page 1053 / 1451
» Agile Performance Testing
Sort
View
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
15 years 10 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
CIS
2005
Springer
15 years 10 months ago
Moving Block Sequence and Organizational Evolutionary Algorithm for General Floorplanning
⎯A new nonslicing floorplan representation, the moving block sequence (MBS), is proposed in this paper. Our idea of the MBS originates from the observation that placing blocks on...
Jing Liu, Weicai Zhong, Licheng Jiao
CONCUR
2005
Springer
15 years 10 months ago
Selecting Theories and Recursive Protocols
Many decidability results are known for non-recursive cryptographic protocols, where the protocol steps can be expressed by simple rewriting rules. Recently, a tree transducer-base...
Tomasz Truderung
ESAS
2005
Springer
15 years 10 months ago
SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations
Mobile ad-hoc networks (MANETs) provide the technical platform for efficient information sharing in emergency and rescue operations. Some the data present on the scene is highly c...
Matija Puzar, Jon Andersson, Thomas Plagemann, Yve...
EUROPAR
2005
Springer
15 years 10 months ago
Parallel Edge-Based Inexact Newton Solution of Steady Incompressible 3D Navier-Stokes Equations
The parallel edge-based solution of 3D incompressible Navier-Stokes equations is presented. The governing partial differential equations are discretized using the SUPG/PSPG stabili...
Renato N. Elias, Marcos A. D. Martins, Alvaro L. G...
« Prev « First page 1053 / 1451 Last » Next »