Sciweavers

7597 search results - page 1434 / 1520
» On the design of metric relations
Sort
View
ITC
2003
IEEE
157views Hardware» more  ITC 2003»
15 years 3 months ago
Parity-Based Concurrent Error Detection in Symmetric Block Ciphers
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption. We will describe a general concurren...
Ramesh Karri, Grigori Kuznetsov, Michael Göss...
MICRO
2003
IEEE
135views Hardware» more  MICRO 2003»
15 years 3 months ago
Generational Cache Management of Code Traces in Dynamic Optimization Systems
A dynamic optimizer is a runtime software system that groups a program’s instruction sequences into traces, optimizes those traces, stores the optimized traces in a softwarebase...
Kim M. Hazelwood, Michael D. Smith
P2P
2003
IEEE
157views Communications» more  P2P 2003»
15 years 3 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
DOCENG
2003
ACM
15 years 3 months ago
Structuring interactive TV documents
Interactive video technology is meant to support user-interaction with video in scene objects associated with navigation in video segments and access to text-based metadata. Inter...
Rudinei Goularte, Edson dos Santos Moreira, Maria ...
HT
2003
ACM
15 years 3 months ago
Finding the story: broader applicability of semantics and discourse for hypermedia generation
Generating hypermedia presentations requires processing constituent material into coherent, unified presentations. One large challenge is creating a generic process for producing ...
Lloyd Rutledge, Martin Alberink, Rogier Brussee, S...
« Prev « First page 1434 / 1520 Last » Next »