Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Ch...
We describe the evolution of a statistical survey design visual language from a standalone design-time modelling language into an environment supporting design, coordination, exec...
Distance function computation is a key subtask in many data mining algorithms and applications. The most effective form of the distance function can only be expressed in the conte...
This paper presents the design of a business-aligned information system (IS) from an actor-network perspective, viewing non-human intermediaries jointly as inscriptions and bounda...
It is well known that both space and the spatial organization play an important role in our work and learning environments as well as in everyday life. There is a definite need fo...
Christos Bouras, Ch. Tegos, V. Triglianos, Thrasyv...