Sciweavers

3373 search results - page 403 / 675
» Linear transformations on codes
Sort
View
FDTC
2007
Springer
124views Cryptology» more  FDTC 2007»
15 years 10 months ago
Countermeasures against Branch Target Buffer Attacks
Branch Prediction Analysis has been recently proposed as an attack method to extract the key from software implementations of the RSA public key cryptographic algorithm. In this p...
Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi,...
154
Voted
WCC
2005
Springer
156views Cryptology» more  WCC 2005»
15 years 9 months ago
One and Two-Variable Interlace Polynomials: A Spectral Interpretation
We relate the one- and two-variable interlace polynomials of a graph to the spectra of a quadratic boolean function with respect to a strategic subset of local unitary transforms. ...
Constanza Riera, Matthew G. Parker
136
Voted
EXTREME
2004
ACM
15 years 9 months ago
A Simple Proof for the Turing-Completeness of XSLT and XQuery
The World Wide Web Consortium recommends both XSLT and XQuery as query languages for XML documents. XSLT, originally designed to transform XML into XSL-FO, is nowadays a fully gro...
Stephan Kepser
ICMCS
2000
IEEE
109views Multimedia» more  ICMCS 2000»
15 years 8 months ago
Source-Channel Matching Space-Time Diversity for Multimedia Communications
A source-channel matching space-time diversity technique is presented for reliable delivery of layer coded multimedia services through wireless channels. The transmission system i...
Haitao Zheng, K. J. Ray Liu
120
Voted
ECBS
1999
IEEE
93views Hardware» more  ECBS 1999»
15 years 8 months ago
Structured Specification of Model Interpreters
Model interpreters play an essential role in modelintegrated systems: they transform domain-specific models into executable models. The state-ot-the-art of model interpreter writi...
Gabor Karsai