Sciweavers

362 search results - page 66 / 73
» Making the Most of Cache Groups
Sort
View
ASIACRYPT
2004
Springer
15 years 3 months ago
Eliminating Random Permutation Oracles in the Even-Mansour Cipher
Abstract. Even and Mansour [EM97] proposed a block cipher construction that takes a publicly computable random permutation oracle P and XORs different keys prior to and after appl...
Craig Gentry, Zulfikar Ramzan
SIGUCCS
2003
ACM
15 years 2 months ago
How to recruit, motivate and retain effective student workers?
Louisiana State University’s Biomedical Research Center is on a tight state funded budget, as are most state educational institutions. Resources are constantly being exhausted a...
Claire C. Lassalle, Robyn C. Richard
WS
2003
ACM
15 years 2 months ago
An authentication framework for hierarchical ad hoc sensor networks
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigat...
Mathias Bohge, Wade Trappe
TEI
2010
ACM
130views Hardware» more  TEI 2010»
15 years 2 months ago
Creating with cobots
In the world of interactive art, very few pieces have a permanent, physical outcome. In response to this observation, the author developed two “cobots”, or collaborative robot...
Christian D. Cerrito
COMPSAC
2002
IEEE
15 years 2 months ago
Dependency Analysis and Visualization as Tools to Prolong System Life
This paper describes our experience using dependency analysis and visualization as a tool to identify intervention points for migrating applications to environments where they can...
Dave McComb, Simon Robe, Simon Hoare, Stew Crawfor...