Sciweavers

1628 search results - page 95 / 326
» Compiler Construction Using Scheme
Sort
View
ICCD
2002
IEEE
93views Hardware» more  ICCD 2002»
15 years 11 months ago
Speculative Trace Scheduling in VLIW Processors
VLIW processors are statically scheduled processors and their performance depends on the quality of the compiler’s scheduler. We propose a scheduling scheme where the applicatio...
Manvi Agarwal, S. K. Nandy, Jos T. J. van Eijndhov...
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 9 months ago
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and ...
Mark Manulis
LREC
2010
158views Education» more  LREC 2010»
15 years 3 months ago
A Modality Lexicon and its use in Automatic Tagging
This paper describes our resource-building results for an eight-week JHU Human Language Technology Center of Excellence Summer Camp for Applied Language Exploration (SCALE-2009) o...
Kathrin Baker, Michael Bloodgood, Bonnie J. Dorr, ...
134
Voted
LATINCRYPT
2010
15 years 25 days ago
Generic Attacks on Misty Schemes
Abstract. Misty schemes are classic cryptographic schemes used to construct pseudo-random permutations from 2n bits to 2n bits by using d pseudo-random permutations from n bits to ...
Valérie Nachef, Jacques Patarin, Joana Treg...
172
Voted
EUROCRYPT
2010
Springer
15 years 7 months ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...