Sciweavers

4985 search results - page 876 / 997
» Observation of String-Rewriting Systems
Sort
View
141
Voted
HIPEAC
2007
Springer
15 years 7 months ago
Efficient Program Power Behavior Characterization
Fine-grained program power behavior is useful in both evaluating power optimizations and observing power optimization opportunities. Detailed power simulation is time consuming and...
Chunling Hu, Daniel A. Jiménez, Ulrich Krem...
APSEC
2004
IEEE
15 years 7 months ago
A Dual-Mode Exerciser for a Collaborative Computing Environment
Computer-supported cooperative work (CSCW) supports groups with communication and coordination during the execution of their activities. It allows physically dispersed teams to en...
Chien-Min Wang, Shyh-Fong Hong, Shun-Te Wang, Hsi-...
DATE
2006
IEEE
95views Hardware» more  DATE 2006»
15 years 7 months ago
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
- Many electronic systems contain implementations of cryptographic algorithms in order to provide security. It is well known that cryptographic algorithms, irrespective of their th...
Nachiketh R. Potlapally, Anand Raghunathan, Srivat...
149
Voted
ICDE
2000
IEEE
161views Database» more  ICDE 2000»
15 years 7 months ago
Efficient Query Refinement in Multimedia Databases
Increasing application demands are pushing database management systems (DBMSs) towards providing adequate and efficient support for content-based retrieval over multimedia objects...
Kaushik Chakrabarti, Kriengkrai Porkaew, Sharad Me...
113
Voted
ISN
1998
Springer
15 years 7 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber