Sciweavers

1913 search results - page 182 / 383
» Group Input Machine
Sort
View
ACSC
2007
IEEE
15 years 8 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
125
Voted
CPM
2007
Springer
134views Combinatorics» more  CPM 2007»
15 years 8 months ago
Efficient Computation of Substring Equivalence Classes with Suffix Arrays
This paper considers enumeration of substring equivalence classes introduced by Blumer et al. [1]. They used the equivalence classes to define an index structure called compact dir...
Kazuyuki Narisawa, Shunsuke Inenaga, Hideo Bannai,...
ANTS
2010
Springer
250views Algorithms» more  ANTS 2010»
15 years 8 months ago
A Subexponential Algorithm for Evaluating Large Degree Isogenies
An isogeny between elliptic curves is an algebraic morphism which is a group homomorphism. Many applications in cryptography require evaluating large degree isogenies between ellip...
David Jao, Vladimir Soukharev
ASAP
2004
IEEE
115views Hardware» more  ASAP 2004»
15 years 8 months ago
A Low-Power Carry Skip Adder with Fast Saturation
In this paper, we present the design of a carry skip adder that achieves low power dissipation and high-performance operation. The carry skip adder's delay and power dissipat...
Michael J. Schulte, Kai Chirca, John Glossner, Hao...
121
Voted
FPLAY
2008
15 years 5 months ago
A low-cost infrastructure for tabletop games
Tabletop games provide an intimate gaming experience where groups of friends can interact in a shared space using shared physical props. Digital tabletop games show great promise ...
Christopher Wolfe, J. David Smith, T. C. Nicholas ...