Sciweavers

3645 search results - page 637 / 729
» Implementing mapping composition
Sort
View
ICISC
2004
112views Cryptology» more  ICISC 2004»
14 years 11 months ago
Improvement on Ha-Moon Randomized Exponentiation Algorithm
Randomized recoding on the exponent of an exponentiation computation into a signed-digit representation has been a well known countermeasure against some side-channel attacks. Howe...
Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, Jae...
ICWN
2004
14 years 11 months ago
Demand-Driven Clustering in MANETs
Abstract-- Many clustering protocols for mobile ad hoc networks (MANETs) have been proposed in the literature. With only one exception so far [1], all these protocols are proactive...
Curt Cramer, Oliver Stanze, Kilian Weniger, Martin...
IIWAS
2004
14 years 11 months ago
On Updating Inheritance Relationship in XML Documents
It is a fact that many XML query languages lack support for update operations. Those that have minimal support do not concern with preserving documents' constraints, and cons...
Eric Pardede, J. Wenny Rahayu, David Taniar
IJIT
2004
14 years 11 months ago
Context for Simplicity: A Basis for Context-aware Systems Based on the 3GPP Generic User Profile
The paper focuses on the area of context modeling with respect to the specification of context-aware systems supporting ubiquitous applications. The proposed approach, followed wit...
Enrico Rukzio, George N. Prezerakos, Giovanni Cort...
ERSA
2003
126views Hardware» more  ERSA 2003»
14 years 11 months ago
Co-Simulation of a Hybrid Multi-Context Architecture
Abstract— Reconfigurable computing architectures aim to dynamically adapt their hardware to the application at hand. As research shows, the time it takes to reconfigure the har...
Rolf Enzler, Christian Plessl, Marco Platzner