Sciweavers

2297 search results - page 256 / 460
» An Algorithm for Computing the Integral Closure
Sort
View
VLSI
2010
Springer
14 years 11 months ago
Spatial EM jamming: A countermeasure against EM Analysis?
Electro-Magnetic Analysis has been identified as an efficient technique to retrieve the secret key of cryptographic algorithms. Although similar mathematically speaking, Power or E...
Francois Poucheret, Lyonel Barthe, Pascal Benoit, ...
PERCOM
2007
ACM
16 years 4 months ago
A Capacitive Sensing Toolkit for Pervasive Activity Detection and Recognition
In this paper we present a toolkit for realizing capacitive sensing applications for human-computer interaction in pervasive computing systems. We argue that capacitive sensors - ...
Raphael Wimmer, Matthias Kranz, Sebastian Boring, ...
BIBE
2005
IEEE
116views Bioinformatics» more  BIBE 2005»
15 years 10 months ago
Stochastic Model of Protease-Ligand Reactions
Prediction of protein tertiary structure based on amino acid sequence is one of the most challenging open questions in computational molecular biology. The two most common experim...
Paul E. Anderson, Douglas W. Raiford, Deacon J. Sw...
EENERGY
2010
15 years 8 months ago
Event-driven processor power management
Energy-efficient computing as a research area has been receiving increasing attention in recent years due to rising energy costs and environmental awareness. In this paper, we pre...
Jan Hendrik Schönherr, Jan Richling, Matthias...
AINA
2004
IEEE
15 years 8 months ago
Generating Digital Signatures on Mobile Devices
With the explosion of the mobile communication market, more and more handheld devices act as clients in the Internet. People use these devices to purchase books, play games, recei...
Yu Lei, Deren Chen, Zhongding Jiang