Sciweavers

1855 search results - page 238 / 371
» System Consequence
Sort
View
DATE
2007
IEEE
89views Hardware» more  DATE 2007»
15 years 11 months ago
Mapping multi-dimensional signals into hierarchical memory organizations
The storage requirements of the array-dominated and looporganized algorithmic specifications running on embedded systems can be significant. Employing a data memory space much l...
Hongwei Zhu, Ilie I. Luican, Florin Balasa
136
Voted
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
14 years 21 days ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
PKC
2012
Springer
212views Cryptology» more  PKC 2012»
13 years 7 months ago
Public-Key Cryptography from New Multivariate Quadratic Assumptions
In this work, we study a new multivariate quadratic (MQ) assumption that can be used to construct public-key encryption schemes. In particular, we research in the following two di...
Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
PERCOM
2009
ACM
15 years 12 months ago
A Dynamic Platform for Runtime Adaptation
—We present a middleware platform for assembling pervasive applications that demand fault-tolerance and adaptivity in distributed, dynamic environments. Unlike typical adaptive m...
Hubert Pham, Justin Mazzola Paluska, Umar Saif, Ch...
ACHI
2008
IEEE
15 years 11 months ago
User-Centred Development of Mobile Interfaces to a Pervasive Computing Environment
—A challenging issue for HCI is the development of usable mobile interfaces for interactions with a complex pervasive environment. We consider a need for interfaces which automat...
Karin Leichtenstern, Elisabeth André