Sciweavers

2555 search results - page 416 / 511
» Quantifiers and Working Memory
Sort
View
154
Voted
CHES
2006
Springer
158views Cryptology» more  CHES 2006»
15 years 7 months ago
Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller
8-bit microcontrollers like the 8051 still hold a considerable share of the embedded systems market and dominate in the smart card industry. The performance of 8-bit microcontrolle...
Manuel Koschuch, Joachim Lechner, Andreas Weitzer,...
121
Voted
EH
2004
IEEE
149views Hardware» more  EH 2004»
15 years 7 months ago
Organization of the Information Flow in the Perception-Action Loop of Evolved Agents
Sensor evolution in nature aims at improving the acquisition of information from the environment and is intimately related with selection pressure towards adaptivity and robustnes...
Alexander S. Klyubin, Daniel Polani, Chrystopher L...
142
Voted
FMCAD
2004
Springer
15 years 7 months ago
Bloom Filters in Probabilistic Verification
Abstract. Probabilistic techniques for verification of finite-state transition systems offer huge memory savings over deterministic techniques. The two leading probabilistic scheme...
Peter C. Dillinger, Panagiotis Manolios
149
Voted
ESAS
2006
Springer
15 years 7 months ago
On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks
We derive the optimality results for key pre distribution scheme for distributed sensor networks, and relations between interesting parameters. Namely, given a key-pool of size n ...
Subhas Kumar Ghosh
142
Voted
ESOP
2006
Springer
15 years 7 months ago
A Typed Assembly Language for Confidentiality
Language-based information-flow analysis is promising in protecting data confidentiality. Although much work has been carried out in this area, relatively little has been done for ...
Dachuan Yu, Nayeem Islam