Sciweavers

5580 search results - page 957 / 1116
» Randomized priority algorithms
Sort
View
SACRYPT
2007
Springer
126views Cryptology» more  SACRYPT 2007»
15 years 11 months ago
Improved Side-Channel Collision Attacks on AES
Abstract. Side-channel collision attacks were proposed in [1] and applied to AES in [2]. These are based on detecting collisions in certain positions of the internal state after th...
Andrey Bogdanov
HICSS
2006
IEEE
119views Biometrics» more  HICSS 2006»
15 years 11 months ago
Increasing Relevance of Smoking Cessation Messages in an Online Software Agent Environment
An online software agent that helps smokers quit was designed and tested. We created a library of categorized smoking cessation messages using meta-data corresponding to the Stage...
Todd Shimoda, Linda Stapel
ICPP
2006
IEEE
15 years 11 months ago
Parallel Information Extraction on Shared Memory Multi-processor System
Text Mining is one of the best solutions for today and the future’s information explosion. With the development of modern processor technologies, it will be a mass market deskto...
Jiulong Shan, Yurong Chen, Qian Diao, Yimin Zhang
ISQED
2006
IEEE
78views Hardware» more  ISQED 2006»
15 years 11 months ago
Simultaneous Statistical Delay and Slew Optimization for Interconnect Pipelines
Process variation has become a major concern in the design of many nanometer circuits, including interconnect pipelines. This paper develops closed-form models to predict the dela...
Andrew Havlir, David Z. Pan
147
Voted
MICRO
2006
IEEE
162views Hardware» more  MICRO 2006»
15 years 11 months ago
Adaptive Caches: Effective Shaping of Cache Behavior to Workloads
We present and evaluate the idea of adaptive processor cache management. Specifically, we describe a novel and general scheme by which we can combine any two cache management alg...
Ranjith Subramanian, Yannis Smaragdakis, Gabriel H...