Sciweavers

18306 search results - page 3212 / 3662
» Algorithmics in Exponential Time
Sort
View
CARDIS
2008
Springer
105views Hardware» more  CARDIS 2008»
15 years 6 months ago
Fast Hash-Based Signatures on Constrained Devices
Digital signatures are one of the most important applications of microprocessor smart cards. The most widely used algorithms for digital signatures, RSA and ECDSA, depend on finite...
Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, J...
CCGRID
2008
IEEE
15 years 6 months ago
AMP: An Affinity-Based Metadata Prefetching Scheme in Large-Scale Distributed Storage Systems
Prefetching is an effective technique for improving file access performance, which can reduce access latency for I/O systems. In distributed storage system, prefetching for metadat...
Lin Lin, Xueming Li, Hong Jiang, Yifeng Zhu, Lei T...
CCS
2008
ACM
15 years 6 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
CEC
2008
IEEE
15 years 6 months ago
Efficient evolution of ART neural networks
Abstract-- Genetic algorithms have been used to evolve several neural network architectures. In a previous effort, we introduced the evolution of three well known ART architects; F...
Assem Kaylani, Michael Georgiopoulos, Mansooreh Mo...
CHES
2008
Springer
132views Cryptology» more  CHES 2008»
15 years 6 months ago
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in...
Philipp Grabher, Johann Großschädl, Dan...
« Prev « First page 3212 / 3662 Last » Next »