Sciweavers

1626 search results - page 173 / 326
» Subtyping with Power Types
Sort
View
123
Voted
IOLTS
2005
IEEE
120views Hardware» more  IOLTS 2005»
15 years 10 months ago
Side-Channel Issues for Designing Secure Hardware Implementations
Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through sidechannels. Sensitive information, such as secret keys, can be obtai...
Lejla Batina, Nele Mentens, Ingrid Verbauwhede
ISCAS
2005
IEEE
229views Hardware» more  ISCAS 2005»
15 years 10 months ago
Comparison of two class E amplifiers for EER transmitter
- This paper compares two types of class E power amplifier and studies their applicability in EER (Envelope Elimination and Restoration) transmitter. In EER applications one of the...
Antti Heiskanen, Timo Rahkonen
ISPDC
2005
IEEE
15 years 10 months ago
A Strategyproof Mechanism for Scheduling Divisible Loads in Distributed Systems
An important scheduling problem is the one in which there are no dependencies between tasks and the tasks can be of arbitrary size. This is known as the divisible load scheduling ...
Daniel Grosu, Thomas E. Carroll
LICS
2005
IEEE
15 years 10 months ago
Name Generation and Linearity
A path-based domain theory for higher-order processes is extended to allow name generation. The original domain theory is built around the monoidal-closed category Lin consisting ...
Glynn Winskel
SMI
2005
IEEE
154views Image Analysis» more  SMI 2005»
15 years 10 months ago
Feature Sensitive Mesh Segmentation with Mean Shift
Feature sensitive mesh segmentation is important for many computer graphics and geometric modeling applications. In this paper, we develop a mesh segmentation method which is capa...
Hitoshi Yamauchi, Seungyong Lee, Yunjin Lee, Yutak...