Sciweavers

1454 search results - page 221 / 291
» Learning and Extending Sublanguages
Sort
View
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
FCCM
2008
IEEE
160views VLSI» more  FCCM 2008»
15 years 10 months ago
Facilitating Processor-Based DPR Systems for non-DPR Experts
Currently, only Xilinx Field Programmable Gate Arrays (FPGAs) support Dynamic Partial Reconfiguration (DPR). While there is currently some Computer Aided Design (CAD) tool support...
Edward Chen, William A. Gruver, Dorian Sabaz, Lesl...
FOCS
2007
IEEE
15 years 10 months ago
Hardness of Reconstructing Multivariate Polynomials over Finite Fields
We study the polynomial reconstruction problem for low-degree multivariate polynomials over finite field F[2]. In this problem, we are given a set of points x ∈ {0, 1}n and ta...
Parikshit Gopalan, Subhash Khot, Rishi Saket
ITICSE
2005
ACM
15 years 10 months ago
Teaching programming and language concepts using LEGOs
concepts more concrete. The method has two main learning outcomes: • Language Specification – The goal of the assignment is to be able to build LEGO® creations on a standard g...
Cynthia S. Hood, Dennis J. Hood
COMPUTER
2007
117views more  COMPUTER 2007»
15 years 4 months ago
Digital Technology and the Skills Shortage
ract in that they deal with sequences of sound or movement. Two social or personality skills can also be defined: Intrapersonal skill helps people perceive and control their own th...
W. Neville Holmes