Sciweavers

683 search results - page 97 / 137
» Four Types of Lookback
Sort
View
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
15 years 1 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
HPCA
1995
IEEE
15 years 1 months ago
The Effects of STEF in Finely Parallel Multithreaded Processors
The throughput of a multiple-pipelined processor suffers due to lack of sufficient instructions to make multiple pipelines busy and due to delays associated with pipeline depende...
Yamin Li, Wanming Chu
SIGLEX
1991
15 years 1 months ago
Acquiring and Representing Semantic Information in a Lexical Knowledge Base
The paper focuses on the description of the approach, taken within the ESPRIT BRA project ACQUILEX, towards: i) acquisition of semantic information from several machine- readable ...
Nicoletta Calzolari
GECCO
2010
Springer
220views Optimization» more  GECCO 2010»
15 years 1 months ago
Interday foreign exchange trading using linear genetic programming
Foreign exchange (forex) market trading using evolutionary algorithms is an active and controversial area of research. We investigate the use of a linear genetic programming (LGP)...
Garnett Carl Wilson, Wolfgang Banzhaf
CSE
2009
IEEE
15 years 1 months ago
Energy Consumption of Residential and Professional Switches
Abstract—Precise evaluation of network appliance energy consumption is necessary to accurately model or simulate the power consumption of distributed systems. In this paper we ev...
Helmut Hlavacs, Georges Da Costa, Jean-Marc Pierso...