Sciweavers

3056 search results - page 77 / 612
» Open Implementation Analysis and Design
Sort
View
100
Voted
INFORMATICALT
2008
91views more  INFORMATICALT 2008»
15 years 3 months ago
Lloyd-Max's Algorithm Implementation in Speech Coding Algorithm Based on Forward Adaptive Technique
In this paper a detail analysis of speech coding algorithm based on forward adaptive technique is carried out. We consider an algorithm that works on frame-by-frame basis, where a ...
Jelena Nikolic, Zoran Peric
131
Voted
FDTC
2006
Springer
117views Cryptology» more  FDTC 2006»
15 years 7 months ago
DPA on Faulty Cryptographic Hardware and Countermeasures
Abstract. Balanced gates are an effective countermeasure against power analysis attacks only if they can be guaranteed to maintain their power balance. Traditional testing and reli...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
134
Voted
ICNP
2005
IEEE
15 years 9 months ago
Typed Abstraction of Complex Network Compositions
straction of Complex Network Compositions∗ Azer Bestavros, Adam D. Bradley, Assaf J. Kfoury, and Ibrahim Matta Department of Computer Science Boston University The heterogeneity...
Azer Bestavros, Adam Bradley, Assaf J. Kfoury, Ibr...
125
Voted
ICALT
2006
IEEE
15 years 9 months ago
Implementation of a Personalized Assessment Web Service
This paper describes the design, development and qualitative evaluation of a web-based personalized assessment service of an object–oriented programming course at the University...
Lilia Cheniti-Belcadhi, Nicola Henze, Rafik Braham
143
Voted
ISICT
2003
15 years 4 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan