Sciweavers

4101 search results - page 571 / 821
» Differential Power Analysis
Sort
View
111
Voted
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
15 years 6 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
88
Voted
KES
2005
Springer
15 years 6 months ago
An Intelligent Approach of Packet Marking at Edge Router for IP Traceback
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
Dae Sun Kim, Choong Seon Hong, Yu Xiang
82
Voted
SG
2005
Springer
15 years 6 months ago
Visualization Tree, Multiple Linked Analytical Decisions
In this paper we tackle the main problem presented by the majority of Information Visualization techniques, that is, the limited number of data items that can be visualized simulta...
José Fernando Rodrigues Jr., Agma J. M. Tra...
ASPDAC
2004
ACM
98views Hardware» more  ASPDAC 2004»
15 years 6 months ago
Enabling on-chip diversity through architectural communication design
- In this paper, we explore a new concept, called on-chip diversity, and introduce a design methodology for such emerging systems. Simply speaking, on-chip diversity means mixing d...
Tudor Dumitras, Sam Kerner, Radu Marculescu
95
Voted
SC
2004
ACM
15 years 6 months ago
Ultrascalable Implicit Finite Element Analyses in Solid Mechanics with over a Half a Billion Degrees of Freedom
The solution of elliptic diffusion operators is the computational bottleneck in many simulations in a wide range of engineering and scientific disciplines. We present a truly sca...
Mark F. Adams, Harun H. Bayraktar, Tony M. Keaveny...