Sciweavers

631 search results - page 93 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
ISCA
1997
IEEE
113views Hardware» more  ISCA 1997»
15 years 5 months ago
Effects of Communication Latency, Overhead, and Bandwidth in a Cluster Architecture
This work provides a systematic study of the impact of communication performance on parallelapplications in a high performance network of workstations. We develop an experimental ...
Richard P. Martin, Amin Vahdat, David E. Culler, T...
ICANN
1997
Springer
15 years 5 months ago
Correlation Coding in Stochastic Neural Networks
Abstract. Stimulus4ependent changes have been observed in the correlations between the spike trains of simultaneously-recorded pairs of neurons from the auditory cortex of marmoset...
Raphael Ritz, Terrence J. Sejnowski
CHI
1996
ACM
15 years 5 months ago
Silk from a Sow's Ear: Extracting Usable Structures from the Web
In its current implementation, the World-Wide Web lacks much of the explicit structure and strong typing found in many closed hypertext systems. While this property has directly f...
Peter Pirolli, James E. Pitkow, Ramana Rao
ICCAD
1994
IEEE
122views Hardware» more  ICCAD 1994»
15 years 5 months ago
An enhanced flow model for constraint handling in hierarchical multi-view design environments
In this paper we present an enhanced design flow model that increases the capabilities of a CAD framework to support design activities on hierarchical multi-view design descriptio...
Pieter van der Wolf, K. Olav ten Bosch, Alfred van...
DAC
2007
ACM
15 years 5 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri