Sciweavers

17129 search results - page 3287 / 3426
» Applied Computing
Sort
View
WWW
2003
ACM
16 years 3 months ago
Presentation Dynamism in XML Functional Programming meets SMIL Animation
The move towards a semantic web will produce an increasing number of presentations whose creation is based upon semantic queries. Intelligent presentation generation engines have ...
Patrick Schmitz, Simon J. Thompson, Peter R. King
ASPLOS
2009
ACM
16 years 3 months ago
RapidMRC: approximating L2 miss rate curves on commodity systems for online optimizations
Miss rate curves (MRCs) are useful in a number of contexts. In our research, online L2 cache MRCs enable us to dynamically identify optimal cache sizes when cache-partitioning a s...
David K. Tam, Reza Azimi, Livio Soares, Michael St...
CHES
2009
Springer
239views Cryptology» more  CHES 2009»
16 years 3 months ago
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its ph...
François-Xavier Standaert, Mathieu Renauld,...
142
Voted
TCC
2009
Springer
169views Cryptology» more  TCC 2009»
16 years 3 months ago
Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms
Abstract. Goldreich (ECCC 2000) proposed a candidate one-way function construction which is parameterized by the choice of a small predicate (over d = O(1) variables) and of a bipa...
James Cook, Omid Etesami, Rachel Miller, Luca Trev...
PKC
2009
Springer
140views Cryptology» more  PKC 2009»
16 years 3 months ago
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Abstract. The success of electronic authentication systems, be it eID card systems or Internet authentication systems such as CardSpace, highly depends on the provided level of use...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
« Prev « First page 3287 / 3426 Last » Next »