Sciweavers

2593 search results - page 284 / 519
» On Two Problems of Nano-PLA Design
Sort
View
AAAI
2010
14 years 11 months ago
The Boosting Effect of Exploratory Behaviors
Active object exploration is one of the hallmarks of human and animal intelligence. Research in psychology has shown that the use of multiple exploratory behaviors is crucial for ...
Jivko Sinapov, Alexander Stoytchev
CCS
2010
ACM
14 years 11 months ago
A new framework for efficient password-based authenticated key exchange
Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on a cryptographically strong session key. The...
Adam Groce, Jonathan Katz
SIGCOMM
2010
ACM
14 years 11 months ago
NetShield: massive semantics-based vulnerability signature matching for high-speed networks
Accuracy and speed are the two most important metrics for Network Intrusion Detection/Prevention Systems (NIDS/NIPSes). Due to emerging polymorphic attacks and the fact that in ma...
Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen...
WWW
2010
ACM
14 years 11 months ago
Protocol-aware matching of web service interfaces for adapter development
With the rapid growth in the number of online Web services, the problem of service adaptation has received significant attention. In matching and adaptation, the functional descri...
Hamid R. Motahari Nezhad, Guang Yuan Xu, Boualem B...
97
Voted
GLVLSI
2008
IEEE
169views VLSI» more  GLVLSI 2008»
14 years 11 months ago
Simultaneous optimization of memory configuration and code allocation for low power embedded systems
This paper proposes a hybrid memory architecture which consists of the following two regions; 1) a dynamic power conscious region which uses low Vdd and Vth and 2) a static power ...
Tadayuki Matsumura, Tohru Ishihara, Hiroto Yasuura