Sciweavers

4698 search results - page 227 / 940
» Making Functionality More General
Sort
View
ISSS
1999
IEEE
168views Hardware» more  ISSS 1999»
15 years 8 months ago
Automatic Architectural Synthesis of VLIW and EPIC Processors
This paper describes a mechanism for automatic design and synthesis of very long instruction word (VLIW), and its generalization, explicitly parallel instruction computing rocesso...
Shail Aditya, B. Ramakrishna Rau, Vinod Kathail
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
15 years 5 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
CHI
2011
ACM
14 years 7 months ago
OldGen: mobile phone personalization for older adults
Mobile devices are currently difficult to customize for the usability needs of elderly users. The elderly are instead referred to specially designed “senior phones” or softwar...
Alex Olwal, Dimitris Lachanas, Ermioni Zacharouli
FIW
2000
114views Communications» more  FIW 2000»
15 years 5 months ago
Feature Interaction in Internet Telephony
While Internet telephony aims to provide services at least equal to traditional telephony, the architecture of Internet telephony is sufficiently different to make it necessary to ...
Jonathan Lennox, Henning Schulzrinne
PR
2008
130views more  PR 2008»
15 years 3 months ago
Active semi-supervised fuzzy clustering
Clustering algorithms are increasingly employed for the categorization of image databases, in order to provide users with database overviews and make their access more effective. ...
Nizar Grira, Michel Crucianu, Nozha Boujemaa