Sciweavers

19985 search results - page 3585 / 3997
» Modelling Ecological Data
Sort
View
WWW
2003
ACM
15 years 10 months ago
User Access Pattern Enhanced Small Web Search
Current search engines generally employ link analysis techniques to web-page re-ranking. However, the same techniques are problematic in small webs, such as websites or intranet w...
Gui-Rong Xue, Hua-Jun Zeng, Zheng Chen, Wei-Ying M...
ARTQOS
2003
Springer
15 years 10 months ago
Calculating End-to-End Queuing Delay for Real-Time Services on an IP Network
A crucial factor for real-time (interactive) services is the end-to-end delay experienced by the application. The contribution resulting from the queuing delay induced by the netwo...
Robert E. Kooij, Olav N. Østerbø, J....
CC
2003
Springer
15 years 10 months ago
Early Control of Register Pressure for Software Pipelined Loops
Abstract. The register allocation in loops is generally performed after or during the software pipelining process. This is because doing a conventional register allocation at firs...
Sid Ahmed Ali Touati, Christine Eisenbeis
EGH
2003
Springer
15 years 10 months ago
Simulation of cloud dynamics on graphics hardware
This paper presents a physically-based, visually-realistic interactive cloud simulation. Clouds in our system are modeled using partial differential equations describing fluid mot...
Mark J. Harris, William V. Baxter, Thorsten Scheue...
FC
2003
Springer
171views Cryptology» more  FC 2003»
15 years 10 months ago
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)
Abstract. In this paper we describe several fault attacks on the Advanced Encryption Standard (AES). First, using optical/eddy current fault induction attacks as recently publicly ...
Johannes Blömer, Jean-Pierre Seifert
« Prev « First page 3585 / 3997 Last » Next »