Sciweavers

5186 search results - page 950 / 1038
» Embedded Systems
Sort
View
EDCC
2008
Springer
15 years 4 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
ESWS
2008
Springer
15 years 4 months ago
Combining Context Navigation with Semantic Autocompletion to Solve Problems in Concept Selection
Many tasks on the semantic web require the user to choose concepts from a limited vocabulary e.g. for describing an indexed resource or for use in semantic search. Semantic autocom...
Reetta Sinkkilä, Eetu Mäkelä, Eero ...
AP2PC
2007
Springer
15 years 4 months ago
Enabling Grassroots Distributed Computing with CompTorrent
This paper describes the operational characteristics of “CompTorrent”, a general purpose distributed computing platform that provides a low entry cost to creating new distribut...
Bradley Goldsmith
FPL
2008
Springer
111views Hardware» more  FPL 2008»
15 years 4 months ago
Sampling from the exponential distribution using independent Bernoulli variates
The exponential distribution is a key distribution in many event-driven Monte-Carlo simulations, where it is used to model the time between random events in the system. This paper...
David B. Thomas, Wayne Luk
CIDR
2007
185views Algorithms» more  CIDR 2007»
15 years 4 months ago
Rethinking Data Management for Storage-centric Sensor Networks
Data management in wireless sensor networks has been an area of significant research in recent years. Many existing sensor data management systems view sensor data as a continuou...
Yanlei Diao, Deepak Ganesan, Gaurav Mathur, Prasha...