Sciweavers

628 search results - page 82 / 126
» Designing the perfect auction
Sort
View
WOWMOM
2006
ACM
118views Multimedia» more  WOWMOM 2006»
15 years 5 months ago
Towards Blocking Outgoing Malicious Impostor Emails
Electronic mails (emails) have become an indispensable part of most people’s daily routines. However, they were not designed for deployment in an adversarial environment, which ...
Erhan J. Kartaltepe, Shouhuai Xu
ISCAS
2005
IEEE
113views Hardware» more  ISCAS 2005»
15 years 5 months ago
On the robustness of an analog VLSI implementation of a time encoding machine
Abstract— Time encoding is a mechanism for representing the information contained in a continuous time, bandlimited, analog signal as the zero-crossings of a binary signal. Time ...
Peter R. Kinget, Aurel A. Lazar, Laszlo T. Toth
CHES
2005
Springer
100views Cryptology» more  CHES 2005»
15 years 5 months ago
Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints
During the last years, several logic styles that counteract side-channel attacks have been proposed. They all have in common that their level of resistance heavily depends on imple...
Thomas Popp, Stefan Mangard
DEXA
2005
Springer
77views Database» more  DEXA 2005»
15 years 5 months ago
An Optimal Skew-insensitive Join and Multi-join Algorithm for Distributed Architectures
Abstract. The development of scalable parallel database systems requires the design of efficient algorithms for the join operation which is the most frequent and expensive operatio...
Mostafa Bamha
LCPC
2005
Springer
15 years 5 months ago
Interprocedural Symbolic Range Propagation for Optimizing Compilers
Abstract. We have designed and implemented an interprocedural algorithm to analyze symbolic value ranges that can be assumed by variables at any given point in a program. Our algor...
Hansang Bae, Rudolf Eigenmann