Sciweavers

7195 search results - page 1202 / 1439
» On Computing Power
Sort
View
163
Voted
ICLP
2010
Springer
15 years 9 months ago
Dynamic Magic Sets for Disjunctive Datalog Programs
Abstract. Answer set programming (ASP) is a powerful formalism for knowledge representation and common sense reasoning that allows disjunction in rule heads and nonmonotonic negati...
Mario Alviano
ARCS
2004
Springer
15 years 8 months ago
A Note on Certificate Path Verification in Next Generation Mobile Communications
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
15 years 8 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
FGR
2004
IEEE
131views Biometrics» more  FGR 2004»
15 years 8 months ago
Active Morphable Model: An Efficient Method for Face Analysis
Multidimensional Morphable Model is a powerful model to analyze and synthesize human faces. However, the stochastic gradient descent algorithm adopted to match the Morphable Model...
Xun Xu, Changshui Zhang, Thomas S. Huang
EMSOFT
2006
Springer
15 years 8 months ago
Scheduling-independent threads and exceptions in SHIM
Concurrent programming languages should be a good fit for embedded systems because they match the intrinsic parallelism of their architectures and environments. Unfortunately, typ...
Olivier Tardieu, Stephen A. Edwards
« Prev « First page 1202 / 1439 Last » Next »