Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Power aware computing has become popular recently and many techniques have been proposed to manage the energy consumption for traditional real-time applications. We have previousl...
Dakai Zhu, Nevine AbouGhazaleh, Daniel Mossé...
Internet voting, sometimes proposed as a means of enhancing democratic participation, is partly inspired by the democratic process of newsgroup creation on Usenet. To better under...
ReGTime1 (Rent Giga
ops someTimes) is a software package for an envisioned \computing power market". ReGTime helps customers to search for providers who allow their workstati...
Bernd Dreier, Annja Huber, Theo Ungerer, Markus Za...
This note describes Proof General, a tool for developing machine proofs with an interactive proof assistant. Interaction is based around a proof script, which is the target of a pr...